How to Make your own TROJAN VIRUS



I guess everyone of you have once in your computer-life experienced a threat to your system called Virus. Now today we will see how a virus is made and which is the most highly and widely used by script kiddies. Before I start the recipe, we need to talk about few types of TROJAN VIRUS attacks;

Well for those who do not know about TROJAN virus (please click to know what Trojan virus is)  TROJAN VIRUS.

First let us talk about the types of Trojan Attacks:


  1. Password Capturing and Sending,
  2. FTP (port:21) Trojan
  3. DOS Trojan (misuse of one's bandwidth)
  4. Remote Acces
  5. Software killer

Above we talked how do Trojans affect you. now we have; where do Trojan/Viruses come from,


  1. Online Chat/Group Chat (Yahoo,Gmail,IRC)
  2. Attached File in email
  3. Physical Access to a System
  4. Free Websites material/software
  5. Wrappers
  6. File Sharing


Softwares which create are (ones which still function):


The Software which I will Demonstrate in front of you is BEAST TROJAN HORSE, (ps: it is difficult to find these days but it's still very effective).
This is how the Software looks when you open it,



Because this software is very controversial, I would not be able to show all the images with respect to the Trojan Building Software.

  1. Now what do hackers do is that they run this software (very small software), They first need the ip address of the victim they need to attack. Lets say they got your ip xxx.xxx.xxx.xxx they will enter it into the blue box just below HOST. (The address given is the default address common to all offline computers)
  2. Next is they require the port through which they need to attack, most of the script kiddies leave it default 6666 or 9999. But if hackers know what they are doing so they try to inject and communicate through the port they think will be vulnerable.
  3. next they click on build server and the window below will open, Most of the script kiddies do not mess with much of the settings,




if it is required to make the virus a little less detectable they change the name to something the user will not be able to recognize, such as the name given above.

    4.  Now before completion to make virus further undetectable they need  go to EXE icon and choose a different icon then application, to just click on BUILD SERVER, an waalaah their virus TROJAN is created.

5. Now when they again look into the folder where beast is stored they find a file named as SERVER.EXE.(33kb to 66kb) this is the TROJAN virus.

  6. Now the only thing left is to plant this virus into the system of the victim by any of the other means above. and the Victim is hacked.

When we go up and look at the first picture will will find a few options on the right hand side of the screen, using those options one can do following actions;

  1. Access ALL DRIVES of the victim and use it for exploitation or criminal activity,
  2. Use the person's WebCam
  3. Can ADD, Plant or even DELETE user softwares and DATA
  4. There are fun tricks also such as open CD drive, Lock Mouse, Lock Screen, Send Chat MEssages to the Victim
  5. Prompt Error Messages to the Victim etc., and many more activities which will surely make the user go pale.

This is a way the Hackers/Script kiddies create their own viruses and  Trojans. So Beware and Be-safe.


PS: All the information provided above is for educational purpose, please don't try this for any criminal activity because if caught can even go to jail.

MANY of you might think that you are not stupid enough to click on a very small file as above, but guess if a picture or a software or a video or document imagine any file is INFECTED then what do you do...???
In the NEXT POST we will talk about how to make IMAGE, SOFTWARE, DOCUMENT, VIDEO, etc a INFECTED VIRUS.

Comments

  1. Hello all
    am looking few years that some guys comes into the market
    they called themselves hacker, carder or spammer they rip the
    peoples with different ways and it’s a badly impact to real hacker
    now situation is that peoples doesn’t believe that real hackers and carder scammer exists.
    Anyone want to make deal with me any type am available but first
    I‘ll show the proof that am real then make a deal like

    Available Services

    ..Wire Bank Transfer all over the world

    ..Western Union Transfer all over the world

    ..Credit Cards (USA, UK, AUS, CAN, NZ)

    ..School Grade upgrade / remove Records

    ..Spamming Tool

    ..keyloggers / rats

    ..Social Media recovery

    .. Teaching Hacking / spamming / carding (1/2 hours course)

    discount for re-seller

    Contact: 24/7

    fixitrogers@gmail.com

    ReplyDelete

  2. My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. I contacted a private investigator that linked me with onlineghost who took care of the hack job. He hacked his iPhone,Facebook,Instagram, Whats app, twitter and email account. I got all I wanted as proof . I”m glad i had a proven truth he was cheating . Contact him for any hack job. Tell him i referred you to him, he will surely meet your hack need. Contact: onlineghosthacker247@ gmail .com

    ReplyDelete

Post a Comment

Popular Posts