Penetration Testing mailing list archives

Creating a Custom Trojan after Social Engineering


From: Slider Slider <0bscur3 () gmail com>
Date: Wed, 12 Jan 2005 17:33:30 -0600

In the middle of a pen test and I have sucessfully SE'd some employees
to visit a website that I created to download a keylogger. I was able
to get a lot of information. I am working on the firewall and there
are no open ports or services running, strictly internet access....so
the thought....

I want to exchange the executable keylogger for a trojan that will
connect to me from the client giving me remote access control.  I have
sampled a few, but can't find any custom programs where I can tell it
what to do and when to uninstall.

Has anyone tried this?  

0bscur3


Current thread: