Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Tuesday, May 1, 2012

Trojan

A Trojan horse, or Trojan, is a program with a benign capability that conceals another malicious program. When the user executes a Trojan horse, the program performs the expected task, however, the program is also performing actions unknown to, and not in the best interests of the user. A Trojan horse will generally not generate direct hazards to the computer except controlling the computer.The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers (just as the Trojans were tricked into taking the Trojan Horse inside their gates).




File:Beast RAT client.jpg
 Beast...a Trojan tool

Purpose and uses

A Trojan may give a hacker remote access to a targeted computer system. Once a Trojan has been installed on a targeted computer system, hackers may be given remote access to the computer allowing them to perform all kinds of operations. Operations that could be performed by a hacker on a targeted computer system may include but are not limited to:
Trojan horses in this way may require interaction with a hacker to fulfill their purpose, though the hacker does not have to be the individual responsible for distributing the Trojan horse. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.
A recent innovation in Trojan horse code takes advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide internet usage. A hacker is able to view internet sites while the tracking cookies, internet history, and any IP logging are maintained on the host computer. The host's computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Newer generations of the Trojan horse tend to "cover" their tracks more efficiently. Several versions of Slavebot have been widely circulated in the US and Europe and are the most widely distributed examples of this type of Trojan horse.

Current use

Due to the popularity of botnets among hackers and the availability of advertising services that permit authors to violate their users' privacy, Trojan horses are becoming more common. According to a survey conducted by BitDefender from January to June 2009, "Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world." This virus has a relationship with worms as it spreads with the help given by worms and travel across the internet with them.
Their main purpose is to make its host system open to access through the internet.
BitDefender also states that approximately 15% of computers are members of a botnet - usually an effect of a Trojan infection.

Popular Trojan horses

  • Netbus (by Carl-Fredrik Neikter)
  • Subseven (by Mobman)
  • Y3K Remote Administration Tool (by Konstantinos & Evangelos Tselentis)
  • Back Orifice (Sir Dystic)
  • Beast
  • Zeus
  • The Blackhole Exploit Kit
  • Flashback Trojan (Trojan.BackDoor.Flashback)

Thursday, April 19, 2012

Crypter(Encryption Tool)

What is a Cryptor?
A Cryptor is a program that makes other programs UD or FUD by encrypting them.

What does UD and FUD means?
UD means undetected , so only a few antivirus programs can detect it.
FUD means fully undetected ,so no antivirus can detect it, this is normally determined by using novirusthanks.org or any other online scanner.

Working of Crypter:
1.Through Encryption(Automatic)
2.Through Hex Editing(Manually)

Some free Cryptors:
1.Cryptonite
2.Spider Binder

Binders


Binder
is a free software used to bind or combine two or more files in one file under one name and extension.The files to be binded can have any extension or icon.The user has choice to select the name,icon and various attributes of binded file.If binded file contains an application(RAT or Keylogger),the application is also executed when the actual binded file is run.

Common Binders:

Iexpress is a inbuilt file buinder available in windows platform from Windows XP To Windows 7.
You can bind files into one.
For Running Iexpress go to RUN and type Iexpress.


File Joiner is a tool that combines(binds) unlimited files(no matter what type) into a single standalone executable File(a container).
The container (the final bounded file) is a simple compiled program that,when opened,will automatically launch the included files.