Creating a Custom Trojan after Social Engineering

From: Slider Slider (0bscur3@gmail.com)
Date: Wed Jan 12 2005 - 18:33:30 EST


In the middle of a pen test and I have sucessfully SE'd some employees
to visit a website that I created to download a keylogger. I was able
to get a lot of information. I am working on the firewall and there
are no open ports or services running, strictly internet access....so
the thought....

I want to exchange the executable keylogger for a trojan that will
connect to me from the client giving me remote access control. I have
sampled a few, but can't find any custom programs where I can tell it
what to do and when to uninstall.

Has anyone tried this?

0bscur3



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:13 EDT