Penetration Testing mailing list archives

Re: Creating a Custom Trojan after Social Engineering


From: H Carvey <keydet89 () yahoo com>
Date: 14 Jan 2005 12:41:07 -0000

In-Reply-To: <1ca2ae50501121533605aae9f () mail gmail com>


I want to exchange the executable keylogger for a trojan that will
connect to me from the client giving me remote access control.  I have
sampled a few, but can't find any custom programs where I can tell it
what to do and when to uninstall.

Has anyone tried this?  

Well, if you can SE them once, maybe you can do it again.  

As far as what to use, IRC bots have been doing this for some time...

H. Carvey
"Windows Forensics and Incident Recovery"
http://www.windows-ir.com
http://windowsir.blogspot.com


Current thread: