Monday, June 14, 2010

Trojans

A Trojan is a malicious program disguised as something benign. Trojans are often downloaded along with another program or software package. Once installed on a system, they can cause data theft and loss, and system crashes or slowdowns; they can also be used as launching points for other attacks such as Distributed Denial of Service (DDOS). Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts. Sophisticated Trojans can connect themselves to their originator or announce the
Trojan infection on an Internet Relay Chat (IRC) channel.





Types of Trojans
TROJ_QAZ is a Trojan that renames the application notepad.exe file to note.com and then copies itself as notepad.exe to the Windows folder. This will cause the Trojan to be launched every time a user runs Notepad. It has a backdoor that a remote user or hacker can use to connect to and control the computer using port 7597. TROJ_QAZ also infects the registry so that it is loaded every time Windows is started.

Tini is a very small and simple backdoor Trojan for Windows operating systems. It listens on port 7777 and gives a hacker a remote command prompt on the target system. To connect to a Tini server, the hacker telnets to port 7777.

Donald Dick is a backdoor Trojan for Windows OS’s that allows a hacker full access to a system over the Internet. The hacker can read, write, delete, or run any program on the system. Donald Dick also includes a keylogger and a registry parser and can perform functions such as opening or closing the CD-ROM tray. The attacker uses the client to send commands the victim listening on a predefined port. Donald Dick uses default port 23476 or 23477.
NetBus is a Windows GUI Trojan program and is similar in functionality to Donald Dick. It adds the registry key HKEY_CURRENT_USER\NetBus Server and modifies the HKEY_CURRENT_USER\NetBus Server\General\TCPPort key. If NetBus is configured to start automatically, it adds a registry entry called NetBus Server Pro in
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
.
SubSeven is a Trojan that can be configured to notify a hacker when the infected computer connects to the Internet and can tell the hacker information about the system. This notification can be done over an IRC network, by ICQ, or by e-mail. SubSeven can cause a system to slow down, and generates error messages on the infected system.
BackOrifice 2000 is a remote administration tool that an attacker can use to control a system across a TCP/IP connection using a GUI interface. BackOrifice doesn’t appear in the task list or list of processes, and it copies itself into the registry to run every time the computer is started. The filename that it runs is configurable before it’s installed. BackOrifice modifies the




HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
registry key. BackOrifice plug-ins add features to the BackOrifice program. Plug-ins include cryptographically
strong Triple DES encryption, a remote desktop with optional mouse and keyboard control, drag-and-drop encrypted file transfers, Explorer-like filesystem browsing, graphical remote registry editing, reliable UDP and ICMP communications protocols, and stealth capabilities that are achieved by using ICMP instead of TCP and UDP.
BoSniffer appears to be a fix for BackOrifice but is actually a BackOrifice server with the
SpeakEasy plug-in installed. If BoSniffer.exe the BoSniffer executable, is run on a target system it attempts to log on to a predetermined IRC server on channel #BO_OWNED with a random username. It then proceeds to announce its IP address and a custom message every few minutes so that the hacker community can use this system as a zombie for future attacks.



Hacking Tools

Graffiti is an animated game that can be wrapped with a Trojan. It entertains the user with an animated game while the Trojan is being installed in the background. Silk Rope 2000 is a wrapper that combines the BackOrifice server and any other specified application.ELiTeWrap is an advanced.exe wrapper for Windows used for installing and running programs.
ELiTeWrap can create a setup program to extract files to a directory and execute programs or batch files that display help menus or copy files on to the target system. IconPlus is a conversion program that translates icons between various formats. An attacker can use this type of application to disguise malicious code or a Trojan so that users are tricked into executing it thinking it is a legitimate application.



Wednesday, June 9, 2010

HOW to INSTALL ardamex keylogger

how to install ardamex keylogger
ardamex keylogger latest version download here for free
                
             DOWNLOAD

for how to  install this keylogger see this video











Friday, June 4, 2010

keyloggers

keyloggers
what is keylogger?
-----------------
Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic  analysis.
A keylogger is a stealth program that basically records all of you keystrokes (things you type) and sends it to a log file. From there valuable information, eg. passwords can be found out about you. if u go any websitelike e-bay for example, the person who sets up the keylogger can search through everything after that and find your credit card number and PIN. Keyloggers are also often used by gamers in my expierience who have no idea about anything to do with computer so they just download open-source keyloggers, compile but change the output, and then use them to hack into their friends game accounts (WoW, etc.)
Like stated above, a .bat program is just a program that executes standard Dos commands. Google up on those.
Notepad is a text editor, the same as wordpad, simpletext, VI, etc. It is probably the most commonly used one and yes you can write your source code for many major programs in it, although I recommend you use an environment more built for programming if you were to begin. (Bloodshed, PHP Pro, Visual Studio 2005, etc.)
The bottom line is to write a program it doesn't matter where you write it, you still need a compiler to make it work. When you write in text you are writing using very basic syntax that is almost readable. Compilers take this standard information and translate it into "computer language" for the computer to read and execute. That's basically the essense of programming (missing a few details but meh.)









Types of keyloggers presently available:
1.Spytech SpyAgent Stealth Edition 6.51
2.All In One Keylogger 3.2
3.Spector Pro 2010 build 5392
4.REFOG Personal Monitor 6.1.6
5.eBlaster 2010 build 3132
6.Elite Keylogger Pro 4.7 [build 519]
7. The Best Keylogger 3.53 [build 1003]
8. Stealth Keylogger 5.5
9.SpyBuddy 3.7.5
10. CyberSpy 2.7
11.Perfect Keylogger 1.68
12. WinSession Logger 4.6
13. PC Activity Monitor Pro (PC Acme Pro) 6.5.1
14.ActMon PRO EDITION 5.11
15.XPC Spy Pro 3.33
16.Powered Keylogger 2.3.2.2020
17.Spy Lantern Keylogger Pro 6.0
18.iMonitorPC Pro 2.7.2
19.PC Spy Keylogger 2.3
20.Golden Eye 4.50
21. Key Prowler Pro 3.3.6.0
22. Advanced Keylogger 2.0 [build 2.0.9.3910]
23. Handy Keylogger 4.0 [build 023]