hacker.org Forum Index
RegisterSearchFAQMemberlistUsergroupsLog in
Some method to send certain victim trojan?

 
Reply to topic    hacker.org Forum Index » The Hacker's Server View previous topic
View next topic
Some method to send certain victim trojan?
Author Message
Master^^



Joined: 17 Aug 2011
Posts: 3
Location: bera

Post Some method to send certain victim trojan? Reply with quote
Can some1 help me, i tried my all methods but no success?

_________________
Volim ovu igru nema nista draze i evo tu da me seces ako te ista lazem.

I love this game and there's nothing to compare.
Wed Aug 17, 2011 1:56 pm View user's profile Send private message
GeorgeTI



Joined: 15 May 2008
Posts: 38

Post Reply with quote
Define "all methods", it is something way too abstract.

_________________
George T. I.
Wed Aug 17, 2011 9:20 pm View user's profile Send private message
Master^^



Joined: 17 Aug 2011
Posts: 3
Location: bera

Post Reply with quote
I do not know why I would define my unsuccessful methods,I need a way to hide such exe file to txt or if there is any way to auto run a trojan....

_________________
Volim ovu igru nema nista draze i evo tu da me seces ako te ista lazem.

I love this game and there's nothing to compare.
Wed Aug 17, 2011 9:55 pm View user's profile Send private message
GeorgeTI



Joined: 15 May 2008
Posts: 38

Post Reply with quote
Well, not that I am any specialist on the subject, but trying to "hide" and execute an executable in a text file is a bit tricky. If the user is a bit careless, it can be simple enough, but the whole thing can be easily intercepted by an updated antivirus program and a firewall. One trick is to try and make the executable look like a text tile, aka change the icon to that of a .txt file, change the name to name.txt (actual name is name.txt.exe) and pray that the firewall / antivirus isn't activated at the time. Another one is to try and hide it in a game, so that it can have administrator privileges without much suspicion (people tend to let games pass through everything, even antiviruses, given that most games out there are cracked). But be warned, that these methods are easily intercepted, if the user is a bit experienced or careful.
A general hint: Use common sense.

_________________
George T. I.
Wed Aug 17, 2011 11:11 pm View user's profile Send private message
malachi



Joined: 05 Dec 2010
Posts: 45
Location: 127.0.0.1

Post Reply with quote
@GeorgeTI:
Code:

#DEFINE ALL_METHODS 1


But seriously though, your game idea is pretty good. Personally I find writing a small program that just unpacks and runs the trojan and pops up a little GUI form that doesn't do anything other than look convincing, and naming it RAPIDSHARE_unlimited.exe or some other such nonsense is almost universally successful to the casual user. Worst case scenario you target knows you personally and discovers the virus, which you can deal with via the "shit really? thanks for telling me, goddamn it i'm gonna have to clean out my drive now" defense.

That said, infecting people with trojans is really lame, so don't do it unless you have a very specific and good reason. If it's a prank he won't find it funny, and if it's to show off to other people, it won't impress them. Also, make sure you clean up after yourself when you're done - once you got what you came for, remove the trojan. No, putting a password on the trojan is not good enough. If you leave his computer open to the internet for any longer than absolutely necessary, you're a huge asshole.

_________________
If you would be unloved and forgotten, be reasonable.
Mon Oct 10, 2011 9:40 pm View user's profile Send private message Visit poster's website
Liidian



Joined: 05 Jun 2009
Posts: 202
Location: Guess

Post Reply with quote
I don't understand the point in this thread. Obviously you haven't written this trojan by yourself or you would of been able to mask it as something else in the coding.

_________________
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
Tue Oct 11, 2011 2:16 pm View user's profile Send private message
malachi



Joined: 05 Dec 2010
Posts: 45
Location: 127.0.0.1

Post Reply with quote
who said anything about writing a trojan yourself?

_________________
If you would be unloved and forgotten, be reasonable.
Fri Oct 14, 2011 6:05 am View user's profile Send private message Visit poster's website
Liidian



Joined: 05 Jun 2009
Posts: 202
Location: Guess

Post Reply with quote
Because if you don't write it yourself it's obvious masking problems like this would arise. Retard.

_________________
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
Wed Oct 19, 2011 9:29 am View user's profile Send private message
plope0726



Joined: 15 Dec 2008
Posts: 826

Post Reply with quote
Liidian, why are you still spewing your nonsense on here.
Sun Oct 23, 2011 1:17 am View user's profile Send private message
malachi



Joined: 05 Dec 2010
Posts: 45
Location: 127.0.0.1

Post Reply with quote
Off topic, but browsing through Liidian's post history:

- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-08)
- Liidian does not know how to hack (2010-05-28)
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)

I think we're getting far enough into the past that these are becoming irrelevant. After all, when you're 14, a year and a half is like a quarter of your life, right? I dunno i suck at math what is this I dont even.

- Liidian comes up with a cunning retort, probably something to do with the way I misspelled his/her username at some point in my post (tomorrow)

_________________
If you would be unloved and forgotten, be reasonable.
Sun Oct 23, 2011 5:07 am View user's profile Send private message Visit poster's website
GeorgeTI



Joined: 15 May 2008
Posts: 38

Post Reply with quote
malachi, have you considered a multiple personality or multiple users on the account? Razz
Also,. if you haven't written the trojan yourself doesn't mean that you can't edit it or use it as it is (a well written trojan on a suitable computer aka with a not-too-knowledgeable and/or without firewall / antivirus - believe me there are a LOT of such boxes out there). Writing the trojan means that you have understood what it does first, and that's all it takes to edit an existing one without much fuss.

_________________
George T. I.
Mon Oct 24, 2011 7:58 am View user's profile Send private message
Liidian



Joined: 05 Jun 2009
Posts: 202
Location: Guess

Post Reply with quote
malachi wrote:
Off topic, but browsing through Liidian's post history:

- Liidian does not know what a command prompt is (2011-09-24)
- Liidian likes to hack by "modefying their settings by a program" (2011-05-09)
- Liidian thinks it is impossible to connect to a computer without first infecting it (2011-05-06)
- Liidian thinks of herself as an experienced hacker, and recommends not hacking (2011-01-0Cool
- Liidian does not know how to hack (2010-05-2Cool
- Liidian uses hotmail (2010-03-31)
- Liidian thinks CodeX is a script kiddie (2010-02-24)
- Liidian thinks ARP stands for Armor Protection (2010-02-24)


- Liidian does know what command prompt is and what it does, he simply is trying not to state anything since the overaggressive codex is always around the corner.
-You cannot connect to another persons computer going through firewalls without infecting their computer at first, it is possible to connect to the same LAN network or WAN by knowing the password though.
- Liidian has been mixturing with computers since he was 12, he never claimed to be an experienced hacker and he does indeed think hacking is in most cases unnecessary or stupid.
-You can't describe something as "does not know how to hack", because try defying hacking.
-Liidian does indeed have at least 2 hotmail adresses, some gmails and outlook.
-Liidian does not think CodeX is a script kiddie but does agree that CodeX is a skilled computer engineer, Liidian does simply not like the persona of CodeX.
- Liidian said armor penentration for first mention and secondly liidian does still not know what ARP is.

So stop big mouthing cool boy, im not 14 or whatever. That time has passed. You can mouth me all you want but you have no actual fact of anything and my opinion is correct. If you did not write the trojan yourself of course masking would become a problem. You're simply to stupid or unintelligent to understand therefore i called you a retard, understand now kiddo?

_________________
The whole "system" is a number of people creating a code all together, this code loops and is there for a "system".
System Zero could also be confirmed with one word "Hacker's"
Mon Oct 24, 2011 3:55 pm View user's profile Send private message
GeorgeTI



Joined: 15 May 2008
Posts: 38

Post Reply with quote
OK now, flames set aside:

Liidian wrote:

-You cannot connect to another persons computer going through firewalls without infecting their computer at first, it is possible to connect to the same LAN network or WAN by knowing the password though.


I am not that sure about this, I mean the switches and routers still can be buggy, not updated or with weak / no passwords. Also, infecting the computer doesn't mean 100% success; a well-configured firewall will intercept the outgoing connections as well. All in all, even infecting can be from ineffective to even not necessary.

Liidian wrote:

- Liidian has been mixturing with computers since he was 12, he never claimed to be an experienced hacker and he does indeed think hacking is in most cases unnecessary or stupid.


Hacking is in most cases essential, as long as it remains white-hat. The ones who publish the exploits are mostly hackers, think about what would happen if none of honest intentions actually hacked? If only black-hats hacked, there would be just chaos, and yes, such people usually have nothing better to do Razz

Liidian wrote:

- Liidian said armor penentration for first mention and secondly liidian does still not know what ARP is.


If you google it, you can see that ARP stands for Adress Resolution Protocol, quite simple, really -.-"

_________________
George T. I.
Mon Oct 24, 2011 8:53 pm View user's profile Send private message
malachi



Joined: 05 Dec 2010
Posts: 45
Location: 127.0.0.1

Post Reply with quote
Liidian, you do realize that you are in fact connecting to a computer every time you browse a webpage, send an email, etc? You know when your browser says "Connecting to [...]"? Believe it or not, it is in fact connecting to something.

I'm not gonna bother with the rest.

_________________
If you would be unloved and forgotten, be reasonable.
Mon Oct 24, 2011 9:03 pm View user's profile Send private message Visit poster's website
Display posts from previous:    
Reply to topic    hacker.org Forum Index » The Hacker's Server All times are GMT
Page 1 of 1

 
Jump to: 
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB © 2001, 2005 phpBB Group
Design by Freestyle XL / Flowers Online.