How to use a Trojan for hacking?

@ceepee (24)
India
January 9, 2007 11:25pm CST
A trojan is a remote admin tool which helps the hacker to control a remote computer.There will be a server program which run invisible on victims computer and a client program on hackers computer which they can use to conect to server using ip address.So first you have to infect the victim with the server.There are a lot of trojans with diffrent features.Most of the trojans comes with a server editor which helps to edit server file and let you to change server pass,port etc. How to infect? There are a lot of programs called binders.These can be used for this.First bind this with a picture or any other file and send to the victim.When he opens it he only sees the picture file. Getting IP of victim: Most of the servers have its own IP notification methods.So just set it while editing server. How it works: When victim open an infected file then the server starts to run invisible and it will autostart in his PC whenever he restarts his pc.The server keeps a port open and waits for a conection. After the conection established it helps to run a lot of commands in victim pc.Even you can shutdown or restart his pc or can get his passwords and other valuable information.You can download his files,get a screen shot or run a program or download files to his pc. **This info is just for educational purpose and to take defence measures against an attack.Dont misuse it**
1 response
@raghwagh (1527)
• India
10 Jan 07
Hi friend I think such things cannot be discussed on myLot.Check the do's and dont's on myLot link on right top of this page before starting discussion.
@ceepee (24)
• India
10 Jan 07
Im not doing anything illegal.This is just an informative discussion which helps people to defend themselves from an attack.
1 person likes this