Follow us on Twitter!
I'd prefer to die standing, than to live on my knees - Che Guevara
Thursday, April 24, 2014
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Members Online
Total Online: 20
Guests Online: 15
Members Online: 5

Registered Members: 82895
Newest Member: kevy90
Latest Articles

Trojan attack

Arrow Image Learn Here About trojan attacking

Trojan Attack

A trojan is a program that is capable of giving hackers control over the attacked pc.

The most common features of trojan are:
> Capture a screen shot of the computer.
> Record all your key strokes and send them to the hacker.
> Use your pc as a bridge to do other hacking related activities.
> Can lock you Keyboard and mouse activities.

/Now how many times have you double clicked on a file that someone has sent you and nothing happens ?
/Weird isn\'t it.

Yeah there is a greater possibility that you have just Zapped yourself with a trojan.

We are going to look at a popular Trojan by the name of Netbus.
A trojan consist of two parts:

1.The Server which get installed to the target.
2.And the client which is used by the hacker to connect to your system.

Now to be able to do this you need to get the Victim to install the trojan by not being aware.
What cool is that you can link your trojan with another executable file.
This is used to limite the awareness on the victim.

Think of this as .\"Cooldrink + Cynide(poison)=poisonedCooldrink\"

The victim would drink the mixture without being aware but in a couple of minutes bang the victim is dead.

Same as here in Trojan attack.

The hacker would combine the trojan with an unsuspecting program mostly games.Using the jioner utility
e.g. Netbus + GalacticHacker(Game)=Contaminated GalacticHacker
(0.014 Mb) + (1.3 Mb) = (1.314 Mb)
Combination of two executable files to get one executable.

Notice the change in the size of the Contiminated Game.

Once the targeted victim double clicks the contaminated Game the trojan will get installed on the system
without the victim noticing it.
and the Game get installed normally without any problems.
Now the victim has just intalled a Server to his system without being suspecious.

Once the trojan get installed it will send the messege to the sender notifying about the:
>The Victims I.P
>If the victim is online
>And what is the victim\'s user name

Now what you can do is use the client to have access to the victims pc.

you can be able to download netbus at:


kaksiion October 03 2007 - 14:01:54
just some basics what happens if you click twice on a trojan. Nothing new... duh?
Skunkfooton October 03 2007 - 16:21:39
I'm a bit confused on why you wrote this article Pfft
only_samuraion October 03 2007 - 16:45:30
im confused as to why it was accepted
mr noobon October 03 2007 - 17:47:01
great, something we already knew about trojans. if youd mentioned the binary injection to link the trojan or alternative intrusion methods to social engineering, then it wouldve been good. maybe even polymorphism. but every computer user should already know this. rated poor
spywareon October 03 2007 - 19:41:15
Funny how some people can use so many words without actually saying anything.
system_meltdownon October 03 2007 - 20:52:09
Lol, most trojans, unless self-coded, or opensource, normally have a backdoor in the server.exe file, which sets your pc up with the trojan too, so other people can do shit to your pc, while you do shit to others, so, in my opinion, trojans can go suck dick.:angry:
richohealeyon October 03 2007 - 22:50:09
.......who the fuck accepted this?!
asilvermtzionon October 04 2007 - 03:30:47
Thanks this was a great informative article fuck the haters they are blatently noobs who dont understand this article!
johnjuan728on October 04 2007 - 05:05:00
yea.. your "noobs" are the admins to the site and the critics.. congratulations, you insulted the admins Pfft
korgon October 04 2007 - 08:36:52
Waste of space and I agree with system on this on! Trojans blow ass > netbus is detected by every A/V program out there.
kaksiion October 04 2007 - 12:18:46
asilvermtzion: rofl dude. Sarcasm?
mr noobon October 04 2007 - 17:48:48
@spyware, i was making a point about the lack of any interesting detail? @asilverperson... lol youre joking right?
spywareon October 04 2007 - 18:25:32
Mr_Noob, I was commenting the article, not your comment (which provided more in-depth knowledge than this whole thing by the way).
mr noobon October 04 2007 - 19:38:20
oh ok fair enough Smile twas because you posted right after me lol
Uber0non October 05 2007 - 07:28:29
@korg: Backdoors can be damn fun, and if you code your own the AV won't detect it Wink
korgon October 07 2007 - 20:24:22
@Uber0n I'm aware of self coding, but premade shit like netbus are bullshit. That's what I mean.
ap101on October 10 2007 - 07:17:41
ya Trojans are fucking lame, unless you make your own Wink, oh ya and now for the article, its utter crap, and should be removed and burned...ok maybe not burning...ummmm I'm going to shut up, but to drive home a already made point, this article sucks. :right:
Zephyr_Pureon October 12 2007 - 00:58:10
I actually learned more from THIS than I did from your stupid fucking waste of space. Your article should be entitled: "You're the moron that opened a trojan w/o using common sense." Then, MAYBE, it would get some positive responses. As it is... define trojans, mention splicing programs, and be done with it.
southafrica1on January 07 2010 - 21:26:49
In your article you had some formulas such as: "Cooldrink + Cynide(poison)=poisonedCooldrink" and "Netbus + GalacticHacker(Game)=Contaminated GalacticHacker" well heres another one for you: "An article + utterCrap= an UtterlyCrappyArticle"Smile
Post Comment


You must have completed the challenge Basic 1 and have 100 points or more, to be able to post.