Penetration Testing mailing list archives
Re: Creating a Custom Trojan after Social Engineering
From: H Carvey <keydet89 () yahoo com>
Date: 14 Jan 2005 12:41:07 -0000
In-Reply-To: <1ca2ae50501121533605aae9f () mail gmail com>
I want to exchange the executable keylogger for a trojan that will connect to me from the client giving me remote access control. I have sampled a few, but can't find any custom programs where I can tell it what to do and when to uninstall. Has anyone tried this?
Well, if you can SE them once, maybe you can do it again. As far as what to use, IRC bots have been doing this for some time... H. Carvey "Windows Forensics and Incident Recovery" http://www.windows-ir.com http://windowsir.blogspot.com
Current thread:
- Creating a Custom Trojan after Social Engineering Slider Slider (Jan 13)
- <Possible follow-ups>
- RE: Creating a Custom Trojan after Social Engineering Eric McCarty (Jan 13)
- RE: Creating a Custom Trojan after Social Engineering Todd Towles (Jan 14)
- Re: Creating a Custom Trojan after Social Engineering H Carvey (Jan 14)
- RE: Creating a Custom Trojan after Social Engineering Todd Towles (Jan 17)