Penetration Testing mailing list archives
Creating a Custom Trojan after Social Engineering
From: Slider Slider <0bscur3 () gmail com>
Date: Wed, 12 Jan 2005 17:33:30 -0600
In the middle of a pen test and I have sucessfully SE'd some employees to visit a website that I created to download a keylogger. I was able to get a lot of information. I am working on the firewall and there are no open ports or services running, strictly internet access....so the thought.... I want to exchange the executable keylogger for a trojan that will connect to me from the client giving me remote access control. I have sampled a few, but can't find any custom programs where I can tell it what to do and when to uninstall. Has anyone tried this? 0bscur3
Current thread:
- Creating a Custom Trojan after Social Engineering Slider Slider (Jan 13)
- <Possible follow-ups>
- RE: Creating a Custom Trojan after Social Engineering Eric McCarty (Jan 13)
- RE: Creating a Custom Trojan after Social Engineering Todd Towles (Jan 14)
- Re: Creating a Custom Trojan after Social Engineering H Carvey (Jan 14)
- RE: Creating a Custom Trojan after Social Engineering Todd Towles (Jan 17)