Re: Creating a Custom Trojan after Social Engineering

From: H Carvey (keydet89@yahoo.com)
Date: Fri Jan 14 2005 - 07:41:07 EST


('binary' encoding is not supported, stored as-is) In-Reply-To: <1ca2ae50501121533605aae9f@mail.gmail.com>


>I want to exchange the executable keylogger for a trojan that will
>connect to me from the client giving me remote access control. I have
>sampled a few, but can't find any custom programs where I can tell it
>what to do and when to uninstall.
>
>Has anyone tried this?

Well, if you can SE them once, maybe you can do it again.

As far as what to use, IRC bots have been doing this for some time...

H. Carvey
"Windows Forensics and Incident Recovery"
http://www.windows-ir.com
http://windowsir.blogspot.com



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:13 EDT