Page 1 of 1

Some method to send certain victim trojan?

Posted: Wed Aug 17, 2011 1:56 pm
by Master^^
Can some1 help me, i tried my all methods but no success?

Posted: Wed Aug 17, 2011 9:20 pm
by GeorgeTI
Define "all methods", it is something way too abstract.

Posted: Wed Aug 17, 2011 9:55 pm
by Master^^
I do not know why I would define my unsuccessful methods,I need a way to hide such exe file to txt or if there is any way to auto run a trojan....

Posted: Wed Aug 17, 2011 11:11 pm
by GeorgeTI
Well, not that I am any specialist on the subject, but trying to "hide" and execute an executable in a text file is a bit tricky. If the user is a bit careless, it can be simple enough, but the whole thing can be easily intercepted by an updated antivirus program and a firewall. One trick is to try and make the executable look like a text tile, aka change the icon to that of a .txt file, change the name to name.txt (actual name is name.txt.exe) and pray that the firewall / antivirus isn't activated at the time. Another one is to try and hide it in a game, so that it can have administrator privileges without much suspicion (people tend to let games pass through everything, even antiviruses, given that most games out there are cracked). But be warned, that these methods are easily intercepted, if the user is a bit experienced or careful.
A general hint: Use common sense.

Posted: Mon Oct 10, 2011 9:40 pm
by malachi
@GeorgeTI:

Code: Select all

#DEFINE ALL_METHODS 1
But seriously though, your game idea is pretty good. Personally I find writing a small program that just unpacks and runs the trojan and pops up a little GUI form that doesn't do anything other than look convincing, and naming it RAPIDSHARE_unlimited.exe or some other such nonsense is almost universally successful to the casual user. Worst case scenario you target knows you personally and discovers the virus, which you can deal with via the "shit really? thanks for telling me, goddamn it i'm gonna have to clean out my drive now" defense.

That said, infecting people with trojans is really lame, so don't do it unless you have a very specific and good reason. If it's a prank he won't find it funny, and if it's to show off to other people, it won't impress them. Also, make sure you clean up after yourself when you're done - once you got what you came for, remove the trojan. No, putting a password on the trojan is not good enough. If you leave his computer open to the internet for any longer than absolutely necessary, you're a huge asshole.

Posted: Tue Oct 11, 2011 2:16 pm
by Liidian
I don't understand the point in this thread. Obviously you haven't written this trojan by yourself or you would of been able to mask it as something else in the coding.

Posted: Fri Oct 14, 2011 6:05 am
by malachi
who said anything about writing a trojan yourself?

Posted: Wed Oct 19, 2011 9:29 am
by Liidian
Because if you don't write it yourself it's obvious masking problems like this would arise. Retard.

Posted: Sun Oct 23, 2011 1:17 am
by plope0726
Liidian, why are you still spewing your nonsense on here.

Posted: Sun Oct 23, 2011 5:07 am
by malachi
Off topic, but browsing through Liidian's post history:

- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-08)
- Liidian does not know how to hack (2010-05-28)
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)

I think we're getting far enough into the past that these are becoming irrelevant. After all, when you're 14, a year and a half is like a quarter of your life, right? I dunno i suck at math what is this I dont even.

- Liidian comes up with a cunning retort, probably something to do with the way I misspelled his/her username at some point in my post (tomorrow)

Posted: Mon Oct 24, 2011 7:58 am
by GeorgeTI
malachi, have you considered a multiple personality or multiple users on the account? :P
Also,. if you haven't written the trojan yourself doesn't mean that you can't edit it or use it as it is (a well written trojan on a suitable computer aka with a not-too-knowledgeable and/or without firewall / antivirus - believe me there are a LOT of such boxes out there). Writing the trojan means that you have understood what it does first, and that's all it takes to edit an existing one without much fuss.

Posted: Mon Oct 24, 2011 3:55 pm
by Liidian
malachi wrote:Off topic, but browsing through Liidian's post history:

- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-08)
- Liidian does not know how to hack (2010-05-28)
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)
- Liidian does know what command prompt is and what it does, he simply is trying not to state anything since the overaggressive codex is always around the corner.
-You cannot connect to another persons computer going through firewalls without infecting their computer at first, it is possible to connect to the same LAN network or WAN by knowing the password though.
- Liidian has been mixturing with computers since he was 12, he never claimed to be an experienced hacker and he does indeed think hacking is in most cases unnecessary or stupid.
-You can't describe something as "does not know how to hack", because try defying hacking.
-Liidian does indeed have at least 2 hotmail adresses, some gmails and outlook.
-Liidian does not think CodeX is a script kiddie but does agree that CodeX is a skilled computer engineer, Liidian does simply not like the persona of CodeX.
- Liidian said armor penentration for first mention and secondly liidian does still not know what ARP is.

So stop big mouthing cool boy, im not 14 or whatever. That time has passed. You can mouth me all you want but you have no actual fact of anything and my opinion is correct. If you did not write the trojan yourself of course masking would become a problem. You're simply to stupid or unintelligent to understand therefore i called you a retard, understand now kiddo?

Posted: Mon Oct 24, 2011 8:53 pm
by GeorgeTI
OK now, flames set aside:
Liidian wrote: -You cannot connect to another persons computer going through firewalls without infecting their computer at first, it is possible to connect to the same LAN network or WAN by knowing the password though.
I am not that sure about this, I mean the switches and routers still can be buggy, not updated or with weak / no passwords. Also, infecting the computer doesn't mean 100% success; a well-configured firewall will intercept the outgoing connections as well. All in all, even infecting can be from ineffective to even not necessary.
Liidian wrote: - Liidian has been mixturing with computers since he was 12, he never claimed to be an experienced hacker and he does indeed think hacking is in most cases unnecessary or stupid.
Hacking is in most cases essential, as long as it remains white-hat. The ones who publish the exploits are mostly hackers, think about what would happen if none of honest intentions actually hacked? If only black-hats hacked, there would be just chaos, and yes, such people usually have nothing better to do :P
Liidian wrote: - Liidian said armor penentration for first mention and secondly liidian does still not know what ARP is.
If you google it, you can see that ARP stands for Adress Resolution Protocol, quite simple, really -.-"

Posted: Mon Oct 24, 2011 9:03 pm
by malachi
Liidian, you do realize that you are in fact connecting to a computer every time you browse a webpage, send an email, etc? You know when your browser says "Connecting to [...]"? Believe it or not, it is in fact connecting to something.

I'm not gonna bother with the rest.