Sinisterly
Trojan Horse - Printable Version

+- Sinisterly (https://sinister.ly)
+-- Forum: Hacking (https://sinister.ly/Forum-Hacking)
+--- Forum: Remote Administration & Stress Testing (https://sinister.ly/Forum-Remote-Administration-Stress-Testing)
+--- Thread: Trojan Horse (/Thread-Trojan-Horse)



Trojan Horse - Merkuri - 10-02-2012

Most of you will probably say "I know what a Trojan is, I know how to setup Darkcomet and forward my ports, and I can control my victims..." However, did you know that there are Trojans that can make your victims proxies? Do you know what a VNC Trojan is?

What a Trojan horse (computing) is:
A type of malware that masquerades as a legitimate file or helpful program, quite possibly with the purpose of granting a hacker unauthorized access to a computer. After a victim is infected with a Trojan horse, an attacker can gain full access to their machine.

The difference between Trojans and viruses:
Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses may steal information, or harm their host computer systems.

The purpose of Trojan horse - a Trojan can :
  • Be used as part of a botnet (spam, DDoSing, etc...)
  • Log keystrokes
  • Crash the computer
  • Allow the uploading or downloading of files to/from the victim's computer
  • Allow modification or deletion of files
  • Be used for electronic money theft
  • Be used for data theft (retrieving passwords, credit card information, etc...)
  • Install other malware
  • Start a VNC server on the victim's machine
  • Capture webcam & microphone activity
  • Destroy the OS as well as local & network drivers
  • Use victim's computer as a proxy
  • And much more...

More about Trojans - It is possible for hackers to scan computers on a network using a scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.

Quote:Trojan-type malware is on the rise, accounting for 83-percent of the global malware detected in the world.
- Bitdefender 2009

Quote:Distribution of Trojans on to compromised computers occurs in a variety of ways. From email attachments and links to instant messages, drive-by downloads and being dropped by other malicious software. Once installed on the compromised computer, the Trojan begins to perform the predetermined actions that it was designed for.
- Symantec 2012

Quote:The affects of a Trojan virus can vary; some Trojans are simply a nuisance and do mischief like changing your desktop icons or changing other visual features. Other Trojans are designed to destroy computer files, folders and programs.
- Kaspersky Labs

Quote:Five million new pieces of malware found in Q3 2011
- Pandalabs


How Trojans Work

[Image: scaled.php?server=141&filename=trojl.jpg&res=landing]


Command Shell Trojans
Command shell Trojans give the attacker remote control via a command shell.

Netcat
[Image: netcat11142951965578.JPG]


E-mail Trojans
E-mail Trojans give the attacker remote control of a victim's machine by sending e-mail.

RemoteByMail
[Image: RemoteByMail.png]


Botnet Trojans
Botnet Trojans are a network of infected computers(bots). They can be use for email spamming, DDoS attacks, Fast flux, and stealing financial information. Bots can also be used for Bitcoin mining without admin authorization.

Netbot attacker
[Image: c0047066_477c278563688.jpg]

Spyeye
[Image: 20101014_spyeye2.gif]


Proxy Trojans
Proxy Trojans allow attackers to use the victim's machine as a proxy and set up a hidden proxy server on the victim's machine.

W3bPrOxy Tr0j4n Cr34t0r
[Image: images?q=tbn:ANd9GcTboILYXVXUiDq4pj03Ncn...UGhaNHrY1F]


VNC Trojans
VNC Trojans allow attackers to use the victim's computer as a VNC server. These Trojans won't be detected from anti-viruses after they are run, because VNC Server is a legitimate program.

WinVNC
[Image: scaled.php?server=708&filename=troj2.jpg&res=landing]


HTTP Trojans
HTTP Trojans bypass firewalls and they use port 80. You don't need to forward ports because they use web-based interfaces.

Vertexnet loader
[Image: sdqs.PNG]


Remote Access Trojans
Everybody knows what Remote Access Trojan (RAT) are. These Trojans allow attacker to use the victim's machine with administrator privileges.

Cybergate
[Image: cybergate.png]


There are many other types of Trojans that I haven't written about. I didn't write how to use each Trojan, so I recommend using Google to find tutorials. My post is only a general overview. If you have any questions, let me know.

Please comment, let me what you think about the tutorial, and what you think I should add/change so my next tutorial can be better.


RE: Trojan Horse - SLUAST - 10-02-2012

Awesome tutorial man, keep it up Smile


RE: Trojan Horse - The Protagonist - 10-02-2012

Great tutorial! Lots of ideas for RATs in this thread. Maybe when I learn C or whatever I might make one Tongue


RE: Trojan Horse - Dismas - 10-02-2012

(10-02-2012, 09:39 PM)The Protagonist Wrote: Great tutorial! Lots of ideas for RATs in this thread. Maybe when I learn C or whatever I might make one Tongue

Not exactly a tutorial, but still excellent information. I've moved it to the Botnets & RATs section.


RE: Trojan Horse - kaiteisbait - 10-05-2012

Nice tutorial! But isn't most of them fall under Botnet Trojan?


RE: Trojan Horse - Oneiiros - 10-08-2012

VNC Trojan... Seems like this could come handy sometime...


RE: Trojan Horse - Charon - 10-12-2012

Really great high quality tutorial!


~INST1NCT


RE: Trojan Horse - The Masterâ„¢ - 10-12-2012

The Trojan Horse is an ancient story where alot of trojans sent a peace gift to a king cant remember the name of the people. While they slept the trojans attacked and murdered them all in their sleep.


RE: Trojan Horse - emalkung99 - 11-22-2012

Great tutorial!, HQ thread


RE: Trojan Horse - ISOCAT - 01-22-2024

Very interesting, a lot to learn but the general gist is here. Good stuff.