Computer Science Canada Home made trojan for anyone interested... |
Author: | Homer_simpson [ Mon Nov 03, 2003 10:14 pm ] |
Post subject: | Home made trojan for anyone interested... |
i was looking through my stuff today... i came about my trojan that i made a long while ago... if anyone is interested i can make u your own personal server and send u the garanteed to work client s u can have some fun with yer friends... =) if u want it just post a message here |
Author: | Tony [ Mon Nov 03, 2003 10:50 pm ] |
Post subject: | |
not really interested (I'm getting in trouble with school administration way to often ![]() just wondering if it's really practical to have it done in turing? I mean for the most part, trojan is stealth. Something I just don't see possible in turing. |
Author: | Homer_simpson [ Mon Nov 03, 2003 10:52 pm ] |
Post subject: | |
oh trust me... it's pretty good the victim wont even know when he has run the trojan cuz it will run in the background program... unless he goes in the taskmanager and endtasks it.. but from all the compsci teachers i've they were all such dumbasses they wouldn't think that far... |
Author: | Tony [ Mon Nov 03, 2003 11:01 pm ] |
Post subject: | |
I'm interested in how you're running a turing program in the background, without user seeing it ![]() |
Author: | Homer_simpson [ Mon Nov 03, 2003 11:43 pm ] |
Post subject: | |
try this i made a simple program running in the background...Go to the desktop the run (use left click to show that it's running... use right click to terminate) |
Author: | Tony [ Mon Nov 03, 2003 11:49 pm ] |
Post subject: | |
testing out an .exe downloaded from a "try out this amazing tojan" post...? no thx ![]() |
Author: | Homer_simpson [ Tue Nov 04, 2003 12:33 am ] |
Post subject: | |
well i'm telling u that this is not the server... i dunno if u can trust that... |
Author: | Tony [ Tue Nov 04, 2003 10:24 am ] |
Post subject: | |
Homer_simpson wrote: i dunno if u can trust that...
well obviously not ![]() |
Author: | Dan [ Tue Nov 04, 2003 12:42 pm ] |
Post subject: | |
meh, virus/trojans in turing is a waste of time, could soooo much more damage and cool things in vb sripted (the best languge for thous windows based e-mail virus). i made a viurs in turing, it was funny it was deginged to seek out and destory all copys of turing and replace them with a copy of the virus. did not wrok gr8 b/c turings netwrok sport sucks big time so it could not spread very fast. the way you make it run in the bake ground is just not dispay anything right Homer? i know that in turing 3.1.1 if you did not display any text and just did file comands and others that had no out to the sreen, that it whould not show a comand thing when complied or at least i think it whont ![]() |
Author: | Tony [ Tue Nov 04, 2003 12:46 pm ] |
Post subject: | |
VB/VB script/VB macros are a much better choice since VB is integrated with windows and MS office... you've got soo much API access and other goodies... ![]() ![]() |
Author: | Homer_simpson [ Tue Nov 04, 2003 5:46 pm ] |
Post subject: | |
well obviously this has been just a test ![]() ![]() ![]() ![]() ![]() |
Author: | Atma Weapon [ Thu Nov 06, 2003 2:03 pm ] |
Post subject: | |
In the interests of free information and satiating my curiosity, please, do share. |
Author: | Homer_simpson [ Thu Nov 06, 2003 3:45 pm ] |
Post subject: | |
so u want me to send it to u atma? |
Author: | Atma Weapon [ Thu Nov 06, 2003 4:09 pm ] |
Post subject: | |
Homer_simpson wrote: so u want me to send it to u atma?
Yes, that would be nice, I think. What does it do, exactly? Is it a simple keylogger? Or something more sinister? |
Author: | Homer_simpson [ Thu Nov 06, 2003 4:41 pm ] |
Post subject: | |
well... it can send u a lot of info about yer victims computer... u can surf his hard drive... add or delete stuff... u can run dos commands... u can send messages, etc... but i'm gonna need your ip... and your email so i can send u the files on email or something... |
Author: | Dan [ Thu Nov 06, 2003 6:25 pm ] |
Post subject: | |
if it dose not mess poleops computers up with out them telling it to you can post it on compsci.ca if you whont. also as long as it dose infect there computers as all and is easy to get ride of. |
Author: | Homer_simpson [ Thu Nov 06, 2003 6:41 pm ] |
Post subject: | |
well since it was just a test i didn't make it spread it's self and it's easy to get rid of but i'm still gonna need yer ip to make yer personalized server... |
Author: | Dan [ Fri Nov 07, 2003 5:02 pm ] |
Post subject: | |
why not make a show off verson that asks user for there ip or reads it from a file? |
Author: | Homer_simpson [ Fri Nov 07, 2003 5:49 pm ] |
Post subject: | |
explain that a bit more... show off version of what? |
Author: | hackman [ Wed Nov 12, 2003 11:13 am ] |
Post subject: | |
Hmm, I could use a copy of that. Trojans are fun, and i'd like to see what turing can do in that catagory. Im at school right now, so i cant get my ip till i get home. And i belive Dan means a version of the trojan that asks you to imput your ip and then automaticaly creates a server. |
Author: | Dan [ Wed Nov 12, 2003 12:12 pm ] |
Post subject: | |
Homer_simpson wrote: explain that a bit more... show off version of what?
of the Trojans, so you dont have to recomple it every time some one asks to see it ![]() |
Author: | Homer_simpson [ Thu Nov 13, 2003 11:13 pm ] |
Post subject: | |
u know that that's not possible to do in turing.... ![]() unless i make up some site to interact with the client so it interacts with it and find the server's ip or some shit like that.... |
Author: | Dan [ Fri Nov 14, 2003 12:43 pm ] |
Post subject: | |
are you shure? i was able to disaply the hostname of the computer my progame was ruing on when i made a chat progame in turing. also i think you can covert hostname to ip in turing as well. i think it is in the net comands. (this was in turing 3.1 so may they messed with it since then) |
Author: | Homer_simpson [ Fri Nov 14, 2003 5:08 pm ] |
Post subject: | |
of course u can get yer ip... but that's not it works... at the beggining the server is in listening status waiting for a connection... when the victim runs the client, the client is gonna try to connect to the server using the ip that it has stored within... so that's y everyone needs separate clients... |
Author: | Dan [ Fri Nov 14, 2003 6:55 pm ] |
Post subject: | |
ohh, now i see what you are saying. i thougth you made it more like the turidional trogen where the client (the victem) is listing for the conection and the server (the actcker) has to input the ip of the client to conect to it. |
Author: | Homer_simpson [ Sat Nov 15, 2003 3:24 pm ] |
Post subject: | |
well that would be pretty dumb... then u gotto hack yer victim's ip first then use the trojan which is pretty dumb.... i dun think that's how traditional trojans work either... the trojan's i used would make a list of all the computers that are infected and u could access any of the victims computers all over the world... |
Author: | Dan [ Mon Nov 17, 2003 5:16 pm ] |
Post subject: | |
Homer_simpson wrote: well that would be pretty dumb... then u gotto hack yer victim's ip first then use the trojan which is pretty dumb....
i dun think that's how traditional trojans work either... the trojan's i used would make a list of all the computers that are infected and u could access any of the victims computers all over the world... well acuahly a lot do, the idea behind the method i metiod whould be that your trogen is very good at infecting comps and whould spread acrose the web. then the actacker whould use an ip scaner to check random, or not so random comps for ports that trogen uses. but i have also seen ones that send an e-mail to some one with the ip when the comp is on. the problem with hard coding the ip is that the ip on alot of comps chages regualry and the vrius writer ushlay whonts to share there app with lots of poleop so the atackers ip whould also be chaging. check out alot of the popualr ones out there and you will see you have to put in the victems ip or hostname. also if you are making this virus with hard coded ips then when athorites go looking for the person who made it, it whould not be hard to find who did it if there ip is coded in to it ![]() |
Author: | Homer_simpson [ Mon Nov 17, 2003 9:21 pm ] |
Post subject: | |
hahahaha... =) in this new one there aint even gonna be a direct connection... i'm trying out different methods... download the test one i made off the visual basic submittions... |
Author: | DanShadow [ Mon Dec 08, 2003 7:00 pm ] |
Post subject: | ... |
hmm...sounds pretty interesting. Could you send it to me as well please? My friends and I used to use VNC...some weird t hing to watch eachother as we did stuff, heh. This would prove fun, if you'll send, please do to: Dark_Vamp665@hotmail.com Thanks! |
Author: | templest [ Fri Dec 12, 2003 10:55 am ] |
Post subject: | |
Funny... people are actually asking someone if they can "please" make a trojan personalized for them so that they may install it on their computer on purpose. ![]() |
Author: | DanShadow [ Fri Dec 12, 2003 4:36 pm ] |
Post subject: | |
If its really a good trojan, my virus scanner will just ask me if I want to quarantine and kill it every time I open the directory with the file in it...if any one tries to use it to hack me...it "may" kill th e link automatically. (I hope ![]() |
Author: | Andy [ Fri Dec 12, 2003 5:51 pm ] |
Post subject: | |
wow how n00b can u get... your virus scan have to know that its a trojan b4 it can delete it... if homer made it, no body would know that its really a trojan |
Author: | Homer_simpson [ Fri Dec 12, 2003 6:39 pm ] |
Post subject: | |
well... actually if his virus scanner is a good one(and is set on max security*) it will detect the unwanted connection and asks him he wants to terminate it... *like mcaffee when u turn the fire wall on... it will ask yer permittion for each and every connection established ![]() ![]() |
Author: | Andy [ Fri Dec 12, 2003 8:35 pm ] |
Post subject: | |
but thats a firewall... not a virus scan |
Author: | Homer_simpson [ Fri Dec 12, 2003 8:40 pm ] |
Post subject: | |
yeah... i guess but most antiviruses i've seen have a built in fire wall... |
Author: | Andy [ Fri Dec 12, 2003 9:16 pm ] |
Post subject: | |
not the most common one tho... norton that is |
Author: | templest [ Fri Dec 12, 2003 11:41 pm ] |
Post subject: | |
yeha but (pardon my eng-r-ish) n0r+0n is teh zhuX. McAfee or even AVG Free version is a better alternative. Most c0ders already know how to crack Norton because it's so popular that everyone is constantly trying to get by it. Even McAfee is starting to let some stuff slip. No one worries about AVG because it's not that widely used. But here I am sounding like a commercial. It's up to you to decide what you think is best. *cough* AVG *cough* |
Author: | Homer_simpson [ Sat Dec 13, 2003 11:51 am ] |
Post subject: | |
well for a virus scanner and firewall... I'd suggest f-secure.... best one i ever tried... |
Author: | white_dragon [ Mon Jan 12, 2004 6:17 pm ] |
Post subject: | |
geeeeeeeeee u guys r soooooooooooooo bad!!!!!!!!! trojan virsuses n all! lol. lol. |
Author: | CjGaughan [ Tue Jan 20, 2004 11:22 am ] |
Post subject: | |
im interested....hehehe...lol Will an AV prog. pick this up? edit..nvm..maybe I should read the post before i ask questions...lol... any good lies/stories anyone has thought up to let the victim accept connections? maybe tell them its a game?lol |
Author: | the_short1 [ Tue Jan 20, 2004 8:26 pm ] |
Post subject: | |
No hard to be an ass in turing.... make a game... every repitition of loop... copies a know file that is on EVERY computer... and paste in a new hidden spot a millions times to take uip hard drive space... you can set you window to be Active in a loop/... so people cant click out of your window... only glitch... can close your window... maybe if you made you window SMALL, and randomly bouce around screen and make you not able to click on it... or only able to click on it... funny... not realy a trojan....Turing can exucute files... can it also do commands like... run msn.exe -backround <<<STuff like that??? i havn;t tried... too busy making new programs / games... BUT WHY DO THIS!!! ITS STUPID>>> would you like getting a Trojan... i think not... also they can probaly track where they got it pretty Easily... |
Author: | Maverick [ Tue Jan 20, 2004 10:42 pm ] |
Post subject: | |
HOmer I am interested in this "program" that you made. Please send! |
Author: | Homer_simpson [ Thu Jan 22, 2004 12:32 pm ] |
Post subject: | |
ok man...i'm gonna send it to yer email... edit: Doh!!! what's yer email? |
Author: | Maverick [ Thu Jan 22, 2004 4:03 pm ] |
Post subject: | |
gregdilts@hotmail.com |
Author: | Andy [ Thu Jan 22, 2004 8:20 pm ] |
Post subject: | |
time to spam maverick |
Author: | Maverick [ Thu Jan 22, 2004 8:31 pm ] |
Post subject: | |
Why thank you, I feed on spam! ![]() |
Author: | the_short1 [ Mon Jan 26, 2004 5:47 pm ] |
Post subject: | |
Hey Everyone.... 2 suggestions please..... 1) Edit your messages so only your first post has you signature with GIANT PICTURE, to limit number of pages.... like crap.. 4!.. 2) Second... Shouldn't an Admin come and lock this up, as Trojans cause harm to people's PC's no mater how careful you are, and will always get into the wrong hands...IE..The little sh** that messed with compsci.. Please consider my 2 suggestions... |
Author: | Homer_simpson [ Tue Feb 03, 2004 11:21 pm ] | ||
Post subject: | |||
since enough ppl have been askin for this shiz i'm opensourcing the client... all u need to do is change yer ip inside the file and compile it... it's pretty obvious what to do u run the file that yer supposed to run on yer comp on yer comp and send the one u compile to the bastard...
|
Author: | Homer_simpson [ Wed Feb 04, 2004 6:11 pm ] |
Post subject: | |
wtf!!! |
Author: | Paul [ Wed Feb 04, 2004 6:19 pm ] |
Post subject: | |
looks like you posted the same thing 4 times, but ur a mod, so you can delete it easily right? |
Author: | shorthair [ Wed Feb 04, 2004 6:54 pm ] |
Post subject: | |
Hmmmm, That was odd , but thanks for the source , ive always wanted to knwo how a couple of those things were donr , thatnks for the great app , ![]() |
Author: | Homer_simpson [ Wed Feb 04, 2004 9:54 pm ] |
Post subject: | |
this is the file u run on yer computer.... and u send the other compiled version of code to the bastard... |