Guest sanjalica 25. junij 2004 Prijavi Deli 25. junij 2004 daj nehaj me strašit...sem brez nortona, brez požarega zidu....sem čisto "gola"... grrrrrrrrrrrrr virusi usmilite se me......... ; dokler ne bom pri volji, da vse to najdem in inštaliram in usposobim.......... Pri meni to traaaaaaaaaaajaaaaa (kot pač vse ) Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Volk K.L. 25. junij 2004 Prijavi Deli 25. junij 2004 Teli pr' Nortonu komplicirajo s temi ključi sto na uro. Mamicu jim kalaisavu. Citiraj Ja sam ka mali pao s lipe Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
VEČNOST 26. junij 2004 Prijavi Deli 26. junij 2004 Kaj pa Panda? Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 Tudi sam sem lastnik virusa. Javlja mi virus TROJANSKI KONJ. Kako bi vedel, kateri virus je to? Norton mi ga ne odstrani.TROJANSKI KONJ NI VIRUS................TO JE LE SERVER..........KAR POMENI DA SE TVOJ RAČUNALNIK OBNAŠA KOT SERVER OZIROMA STREŽNIK DO TISTEGA KI IMA DRUGI DEL TEGA TROJANCA.....KAR POMENI DA SE LAHKO ČLOVEK PRIKLOPI NA TVOJ KOMPJUTER TAKOJ KO SI TI ON-LINE IN BRSKA PO NJEM KAKOR TI BRSKAŠ RECIMO PO LUNINEM NETU............TO U BISTVU NI NIČ STRAŠNEGA..........ODVISNO OD OSEBE NA DRUGI STRANI IN OD TEGA KAKE PODATKE IMAŠ NA KOMPJUTRU...........ZAVEDAJ SE DA IMA VPOGLED V VSE...........VSI TVOJI PASSWORDI........MAILI.....ŠTEVILKE BANČNIH RAČUNOV IN UPRAVLJANJE Z NJIMI (KORIŠČENJE TVOJEGA DENARJA!!!!!)NISO VEČ SKRIVNOST..........SAJ PRAVIM JE PA TO USE ODVISNO OD ČLOVEKA NA DRUGI STRANIPONAQVADI SO TO KAKI OSNOVNOŠOLCIKI PAČ PROBAVAJO HEKERSKE PROGRAMČKE............... PRIPOROČAM KOMBINACIJO VEČIH PROGRAMOVKASPERSKY - ANTIVIRUSTHE CLEANER - TROJAN REMOWERBLACK ICE - FIREWOLL/ APPLICATION PROTECTIONTZ SPYWARE ADWARE REMOWERNOADWARE ČE NE NAJDEŠ KAKIH KOD VEŠ KJE ME NAJDEŠ.......... JE PA TKO ČE SE KDO PROV SPRAV NATE............ HAHAHAHAHA .......UPOŠTEVAJ NAVODILO OD LUCIFERJA.......... FORMATIRAJ DISK..........ČE PA TEGA NEZNAŠ........MI LAHKO POŠLJEŠ SVOJ ..........IP...........PA TI GA BOM JAZ Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
krokodil 11. julij 2004 Prijavi Deli 11. julij 2004 Zanimivo...in pri vsem tem znanju ne ves, kako se izklopi Caps-Lock tipka na tipkovnici... Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
majica 11. julij 2004 Prijavi Deli 11. julij 2004 Lahko potem vprašam za Trojanca... tudi meni javlja ta trojanec...torej je to nekakšna bližnjica tretje osebe do tvojega PC in ima vanj enako velik vpogled, kot ti?Ampak sem slišala, da je Trojanc virus... se da zaščititi pred njim z anti virusnim programom F-secure, ali ne? Citiraj majic@ Рубашк@... 襯衣... 셔츠... のワイシャツSpremeni sebe in spremenil boš ves svet! http://imagecache2.allposters.com/images/pic/SIGN/75035~I-Am-Perfect-Posters.jpg Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 KROKO MAJICA........TROJANC JE IZ DVEH DELOV........KOT .......SPREJEMNIK IN ODDAJNIK..........SPREJEMNIK JE PRI TEBI ODDAJNIK PA PRI NEKOM DRUGEM.............VIRUS PA KOT SAMO IME POVE SE ŠIRI SAM ..........NAJVEČKRAT PREKO MAILA..........LAHKO SE PRILEPI NA KAK FILE IZ RECIMO SISTEMA IN KO TI ANTI VIRUS NAJDE OKUŽBO GA ODSTRANI AMPAK S TEM ODSTRANI TUDI SISTEMSKI FILE IN ZATO TI KOMP ZAČNE BOLJ POČASI DELAT ALI PA TUDI NEHA...............NEKATERI SO NAPISANI TAKO DA KAR SAMI ZBRIŠEJO DOLOČENE FAJLE ............DRUGI PA TI JIH SAMI NAPIŠEJO VELIKO KOLIČINO TAKO DA TI KOMP ZAČNE FUL ŠTEKAT I USUVAT............... VSI TI ANTI VIRUSI SO PRBLIŽN ISTI ŠITSAM DOBR JE DA JIH MAŠ VEČ DA TI BO PA TO USE BL JASN PEJT NA PROGENIC.COM..........PA PREGLEJ GOR MAŠ USE ZA IN PROTI............PA TUT VELIK TEXTOV KAKO SE STVAREM STREŽE ..........POSKUS TUT SAMA MAL POHEKAT TKO SE NAJLAŽI NAUČIŠ KAKO SE TEGA OBRANT.......... Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
krokodil 11. julij 2004 Prijavi Deli 11. julij 2004 KROKO Meni se to ne zdi smesno..je bilo resno misljeno. Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 KROKO Meni se to ne zdi smesno..je bilo resno misljeno. KROKO ...............PREBER MOJ NICK JEBE SE MEN KVA SE TEB ZDI Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 MAL VEČ O TROJANCIH |-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| |++++++++++||The Complete Trojans Text |--------|Written On||(Security Related) | | ||by tHe MaNiAc | |3.04.2000 ||contact me at: themaniac@blackcode.com |--------|++++++++++||maniac@forbidden.net-security.org ||-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| This guide is for educational purposes only I do not take any responsibility about anythinghappen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don'tchange anything without the permission of the author.I'll be happy to see this text on other pages too. All copyrights reserved.You may destribute this text as long as it's not changed. <--=--=--=--=--=--=--=--=>Author Notes: I hope you like my texts and find them useful.If you have any problem or some suggestion feel free to e-mail me but please don't send mails like"I want to hack the US government please help me" or "Tell me how to blind a trojan into a .jpg""WHere can I get a portscanner" etc......Be sure if I can help you with something I will do it.I've started writing security related tutorials and I hope you like that.I'll try to covermuch more topics in my future texts and I want to thank to all of the people that like mytexts.<--=--=--=--=--=--=--=--=> Links:------------------------------ \Here you can find other texts \written by me or other friends: \http://www.blackcode.com /blacksun.box.sk /neworder.box.sk /------------------------------ Table of Contents<---------------------------------------\| \|-1.What Is This Text About? \|-2.What Is A Trojan Horse \|-3.Trojans Today \|-4.The future of the trojans \|-5.Anti-Virus Scanners \|-6.How You Can Get Infected? \|-----From ICQ \|-----From IRC \|-----From Attachment \|-----From Physical Access \|-----From Trick \|-7.How Dangerous A Trojan Can Be? \|-8.Different Kinds Of Trojans \|-----Remote Access Trojans \|-----Password Sending Trojans \|-----Keyloggers \|-----Destructive Trojans \|-----FTP Trojans \|-9.Who Can Infect You? \|-10.What is the attacker looking for? \|-11.How The Trojans Works \|-12.The Most Common Trojan Ports ||-13.How Can I Monitor My Comp for trojans without any scanner?||-14.Software To Help You Monitor Your Computer ||-----Log Monitor /----------------------->|-----PrcView /|-----XNetStat /|-----AtGuard \|-----ConSeal PC FIREWALL \|-----LockDown2000 /|-----TDS / |-15.Placing Backdoors In Programs /|-16.Advices / |-17.Final Words /\_______________________________/ 1.What is this text about?/=-=-=-=-=-=-=-=-=-=-=-=-=-=/In this text I'm going to explain you interesting things aboutthe trojans and about their future.I hope you'll realize thattrojans are dangerous and they're still big security problem althoughmany people say don't download files from the net and you won't getinfected which is not right.The main thing I want to explain here isdo the trojans have future and other interesting things about them.This text is only for Windows based trojans not Unix one.=-=-=-=-=-=-=-=-=-=-=-=-=-= 2.What Is A Trojan Horse?/=-=-=-=-=-=-=-=-=-=-=-=-=/ A trojan horse is-An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user. -A legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user. -Any program that appears to perform a desirable and necessaryfunction but that (because of unauthorized codewithin it that is unknown to the user) performs functions unknown (and probably unwanted) by the user. Trojans can also be called RAT's, or Remote Administration Tools. The trojan got it's name from the old mythical story about how the greeks during the war, gave their enemy a huge wooden horse as a gift.They accepted this gift and they brought into their kingdom, and during the night, greek soldiers crept out of the horse and attacked the city,completely overcoming it. 3.Trojans Today/=-=-=-=-=-=-=-=/Trojans has always been big security problem even today.Most of the peopledon't know what a trojan is and they keep downloading files from untrustedsources or from suspicious people.Today there are more than 600 trojans onthe net that I know but I think there are many many more.Because every hacker orprogramer today have it's own trojan made for his/her special needs and notpublished anywhere.Every hacking group has also it's own trojans and programs.When someone start learning winsock the first creating is chat client or trojanhorse.Even the anti-virus scanners I'll talk below people still get infectedby themselves,by some hacker or by some of your friends.-----------------------> 4.The Future Of Trojans=-=-=-=-=-=-=-=-=-=-=-=-=I think there're a lot of people out there that think thetrojans are outdated and they don't have future.Well I don'tthink so.Trojans will always have future and new things added inthem.There are so many things that can be improved by skilled programersin the trojans.Trojans that COMPLETELY hide in the system and of course restart every time Windows is loadedtrojans that will lie every trojan and anti-virus program this is the future I think.People that program trojans has a lot of ideas that makes their trojans unique.These people start placing backdoors in ActiveX and who knows maybe in future they'llfind other sources they can place the trojans in.Programmers will always think ofnew and unique trojans with functions never seen before. Trojans are made every day by the programers with new options and with better encryption sothe Anti-Trojan software can't detect them.So noone knows how many are the trojans on the net.But the programmers are still programming trojans and they will continue in the future.Technically, a trojan could appear almost anywhere, on any operating system or platform.However, with the exception of the inside job mentioned previously, the spread of trojans worksvery much like the spread of viruses. Software downloaded from the Internet, especially shareware or freeware,is always suspect. Similarly, materials downloaded from underground serversor Usenet newsgroups are also candidates.There are thousand of programs with not checkedsource and new programs are appearing every day especially the freeware one so they can all betrojans.So be careful what you're downloading and from where you're downloading it.Always download software from the official page.-----------------------------> 5.Anti-Virus Scanners/=-=-=-=-=-=-=-=-=-=-=-=/People think that when they have a virus scanner with the latest virus definitionsthey're secure on the net and they can't get infected with a trojan or noone canhave access to their computer.This is NOT right.The purpose of the anti-virusscanners is to detect not trojans but viruses.But when trojans became popularthe scanners started adding also trojan definitions.These scanners just can'tfind the trojans and analyze them that's why they're just detecting the commonand the well know from everyone trojans like Back Orifice and NetBus and alsoseveral other.As I told they're around 600 trojans I know out there and theanti-virus scanners are detecting just a LITTLE part of them.These scanners are not firewalls that will stop someone that want to connectto your computer or try to attack you as people think they are.So I hope thatyou understand that the main purpose of these scanners is not to detecttrojans and protect you while you're online.Most of the internet users know only Back Orifice and NetBus as trojans.There are some specific tools out there that clean ONLY from these trojans.Again people think that they're secure and protected from every trojan.---------------------------> 6.How Can I get Infected?/=-=-=-=-=-=-=-=-=-=-=-=-=-=/Everyone ask this question and often people ask themselves how they gotinfected.Also when someone ask them did they run some file send to themby someone or downloaded from somewhere people always say they didn'trun anything or download some file but they did it.People just don'tpay attention to things they do online and that's why they forgetabout the moment of the infection with the trojan.You can get infected from many places and I'll try to explainyou these things here. 6.1 From ICQ6.2 From IRC6.3 From Attachment6.4 Physical Access6.5 Tricks-diskette 6.1 From ICQ People think that they can't infect while they're talking via ICQbut they just forget the moment when someone sends them a file.Everyone knows how insecure ICQ is and that's why some peopleare afraid of using it. As you maybe know there's a bug in ICQ allowing you to send a .exefile to someone but it will look as .bmp or .jpg or whatever you wantit to look like.This is very dangerous as you see and can get you introuble.The attacker will just change the icon of the file likea BMP image,tell you it's a pic of him,rename it to photo.bmpthen you'll get it and of course before getting it you'll see thatit's .bmp and you're secure because the file is not executable.Then you run it see the picture and you think there's nothing toworry about but there is. That's why most of the people say that they didn't run any filesbecause they know that they've run an image not executable.A way to prevent this bug in ICQ is always to check the type ofthe file before running it.It may has an BMP icon but if at the typeof the file is written executable I thin you know that it will bemistake if you run that file. 6.2 From IRC You can also get infected from IRC by receiving files fromuntrusted sources.But I advice you always to be paranoidand do not receive files from ANYONE even from your bestfriend because someone may stolen his/her passwordand infect you.Some people think that they can be 100% surethat the other person is their friend when they ask him/hersomething like a secret or something else that only he/she knowbut as I told you be paranoid because someone may infect your friendand just check his/her IRC logs and see what is this secret about orlearn other things.Be paranoid it's more secure as I say and do notreceive files from anyone on IRC or from somewhere else likee-mail,ICQ or even your online friends. 6.3 From Attachment The same thing goes about the e-mail attachments.NEVER run anythingeven if it says you'll see hot porno or some passwords for server oranything else.The best way to infect someone with a trojan is masse-mailing the server because there're new people on the net andthey'll of course get infected.This is the best way of infectingas I said that's why it's preferred by the people that want to infectthe masses. 6.4 Physical Access You can of course get infected by some of your "friends" when theyhave physical access to your computer.Let's suppose you leavesomeone on your computer just for 5 minutes,then of course you canget infected by one of your "friends".There are some very smart peopleout there that keep thinking of new ways of getting physical accessto someone's computer.Here are some tricks that are interesting: 1.You "friend" may ask you "Hey bro can you give me some water"or something that will leave him alone.You'll go to take somewater and then........You know 2.The attacker may have a plan.Let's say you invited him/herat 12:00 at your home and that attacker told one of your"friends" to call the victim at 12:15 and start talkingabout something with the victim.The attacker again have timeto infect you.Also the "friend" that is calling you may say something like"Is there anyone around you,if so move somewhereelse I don't want anyone to hear what we are talking about"The attacker is again alone and have time to infect you. 6.5 Trick This is one trick that may work on people that reallywant something and the attacker knows what is it.Let's say that the victim wants to watch some pornoor want xxx passwords,then attacker can just leavea diskette with the trojan in the front of the victim'shouse and put the trojan with some xxx pics of course. This is bad things because sometimes if you really wantsomething and you finally found it you don't think aboutanything else except to check it you.You again get infected. I hope now you understand how you got infected the last time(if you got infected of course).-----------------------------------> 7.How dangerous a trojan can be?/=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/ Many people that don't know what a trojan isthink that when they run an executable nothinghappened because their computer is still workingand all the data is there,if it was a virustheir data will be damaged and their computer willstop working. Someone is downloading and uploading files on yourcomputer.Someone is reading all of your IRC logs and learninginteresting things about you and your friends.Someone is reading ALL of your ICQ messages.Someone is deleting files on your computer. These are some examples how dangerous a trojan can be.There people that use trojans just to place viruson the infected machine like CIH and destroy the machine.---------------------------> 8.Different Kinds Of Trojans=-=-=-=-=-=-=-=-=-=-=-=-=-=-=Remote Access Trojans------------------------------- These trojans are the most popular trojans now.Everyone wants to have such trojan because heor she want to have access to their victim's hard drive.The RAT'S (remote access trojans)are verysimple to use.Just make someone run the serverand you get the victim's IP and you have FULLaccess to his or her computer.They you canalmost everything it depends of the trojan you use.But the RAT'S have the common remote access trojan functions like:keylogger,upload and download function,make a screen shot and so on.Some people use thetrojans for malicious purposes.They want just to delete and delete.This is lame.But a have a guideabout the best way to use a trojan.You should read it.There are many programs out therethat detects the most common trojans,but new trojans arecoming every day and these programs are not the maximum defense.The trojans do always the same things.If the trojan restart every time Windows is loaded thatmeans it put something in the registryor in win.ini or in other system file so the trojan can restart.Also the trojans create some file inthe WINDOWS\SYSTEM directory.The file is always lookingto be something that the victim will thinkis a normal WINDOWS executable.Most trojans hidefrom the Alt+Ctrl+Del menu.This is notgood because there are people who use only this way to seewhich process are running.There are programsthat will tell me you exactly the process and thefile from where it comes.Yeah but some trojansas I told you use fake names and it's a little hardfor some people to understand which processshould they kill.The remote access trojans opensa port on your computer letting everyone to connect.Some trojans has options like change the portand put a password so only the guy that infect youwill be able to use the computer.The changeport option is very good because I'm sure youdon't want your victim to see that port 31337 is openon their computer.Remote access trojans areappearing every day and they will continue to appear.For those that use such trojans: BE CAREFULyou can infect yourself and they the victim youwanted to destroy will revenge and you'll be sorry.---------------------------------------Password Sending Trojans The purpose of these trojans is to rip all cachedpasswords and send them to specified e-mailwithout letting the victim about the e-mail.Most of these trojans don't restart every time Windowsis loaded and most of them use port 25 tosend the e-mail.There are such trojans that e-mailother information too like ICQ numbercomputer info and so on.These trojans are dangerous ifyou have any passwords cached anywhere on your computer.----------------------------------------Keyloggers These trojans are very simple.The only one thingthey do is to log the keys that the victim is pressingand then check for passwords in the log file.In the most cases these trojans restart everytime Windows is loaded.They have optionslike online and offline recording.In the online recordingthey know that the victim is online and they record everything.But in the offline recordingeverything written after Windows start isrecorded and saved on the victims disk waiting forto be transferred.----------------------------------------Destructive The only one function of these trojans is todestroy and delete files.This makes them very simpleand easy to use.They can automaticallydelete all your .dll or .ini or .exe files on your computer.These are very dangerous trojans and onceyou're infected be sure if you don't disinfect yourcomputer information will no longer exist.-----------------------------------------FTP trojans These trojans open port 21 on your computer letting EVERYONE that has a FTP client to connectto your computer without password and will full upload and download options. These are the most common trojans.They all are dangerousand you should me careful using them.--------------------------------------> 9.Who Can Infect You?/=-=-=-=-=-=-=-=-=-=-=/ Well basically you can get infected by everyone that know howto use a trojan(it's VERY easy) and of course know how to infect you.People that use trojans are wannabe hackers that are just at the stageof using trojans.Some of these people don't move to the next stageand they're lamers that can only use trojans and as I said it's VERY easy.But after reading this text you'll know the most common ways that someonecan infect you with a trojan and it will be hard for the people using themto infect you.------------------------> 10.What Is The Attacker Looking For?/=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/ Some of you may think that trojans are used for damage only.Well they can also be used to spy on someone's machine andtake a lot of private information from it.Wellthe common data an attacker looksfor would include but not limit to the following. -----> Credit Card Information-----> Credit Information-----> Checking Account Information-----> Any accounting data-----> Data bases-----> Mailing Lists-----> Personal Addresses-----> Email Addresses-----> Account Passwords-----> Home Office / Small Business Information-----> Company Accounts / Subscribed for Services-----> Resumes-----> Email-----> Any Company Information / Services He Can Access-----> Your or spouse's first and last name-----> Children's names / ages-----> Your address-----> Your telephone number-----> Letters you write to people-----> Email-----> Your personal resume-----> Your family pictures-----> School work-----> Any school accounts / information 11.How The Trojans Works/=-=-=-=-=-=-=-=-=-=-=-=/ Here I'll explain you how the trojans work.If you don't know some wordsyou can check the "Terms Used In The Text" section and read about them there.When the victim runs the server it does functions like opening some specific port and listeningfor connections.It can use TCP or UPD protocols.When you connect with the victim IP the you can do what you want because the server let you dothe trojan functions on the infected computer.Some trojans restart every time Windows is loaded.They modify win.ini or system.ini so the trojan can restart but most of the new trojans use theregistry so they can restart.Trojans communicate like client and server.The victim runs the server,the attacker sends commandto the infected server with the client and the server is just following what the client "says" to it. --------------------------> 12.The Most Common Trojan Ports/=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/Here's a list of the most common trojan ports: Satanz Backdoor|666Silencer|1001Shivka-Burka|1600SpySender|1807Shockrave|1981WebEx|1001Doly Trojan|1011Psyber Stream Server|1170Ultors Trojan|1234VooDoo Doll|1245FTP99CMP|1492BackDoor|1999Trojan Cow|2001Ripper|2023Bugs|2115Deep Throat|2140The Invasor|2140Phineas Phucker|2801Masters Paradise|30129Portal of Doom|3700WinCrash|4092ICQTrojan|4590Sockets de Troie|5000Sockets de Troie 1.x|5001Firehotcker|5321Blade Runner|5400Blade Runner 1.x|5401Blade Runner 2.x|5402Robo-Hack|5569DeepThroat|6670DeepThroat|6771GateCrasher|6969Priority|6969Remote Grab|7000NetMonitor|7300NetMonitor 1.x|7301NetMonitor 2.x|7306NetMonitor 3.x|7307NetMonitor 4.x|7308ICKiller|7789Portal of Doom|9872Portal of Doom 1.x|9873Portal of Doom 2.x|9874Portal of Doom 3.x|9875Portal of Doom 4.x|10067Portal of Doom 5.x|10167iNi-Killer|9989Senna Spy|11000Progenic trojan|11223Hack?99 KeyLogger|12223GabanBus|1245NetBus|1245Whack-a-mole|12361Whack-a-mole 1.x|12362Priority|16969Millennium|20001NetBus 2 Pro|20034GirlFriend|21544Prosiak|22222Prosiak|33333Evil FTP|23456Ugly FTP|23456Delta|26274Back Orifice|31337Back Orifice|31338DeepBO|31338NetSpy DK|31339BOWhack|31666BigGluck|34324The Spy|40412Masters Paradise|40421Masters Paradise 1.x|40422Masters Paradise 2.x|40423Masters Paradise 3.x|40426Sockets de Troie|50505Fore|50766Remote Windows Shutdown|53001Telecommando|61466Devil|65000The tHing|6400NetBus 1.x|12346NetBus Pro 20034SubSeven|1243NetSphere|30100Silencer |1001Millenium |20000Devil 1.03 |65000NetMonitor| 7306Streaming Audio Trojan| 1170Socket23 |30303Gatecrasher |6969Telecommando | 61466Gjamer |12076IcqTrojen| 4950Priotrity |16969Vodoo | 1245Wincrash | 5742Wincrash2| 2583Netspy |1033ShockRave | 1981Stealth Spy |555Pass Ripper |2023Attack FTP |666GirlFriend | 21554Fore, Schwindler| 50766Tiny Telnet Server| 34324Kuang |30999Senna Spy Trojans| 11000WhackJob | 23456Phase0 | 555BladeRunner | 5400IcqTrojan | 4950InIkiller | 9989PortalOfDoom | 9872ProgenicTrojan | 11223Prosiak 0.47 | 22222RemoteWindowsShutdown | 53001RoboHack |5569Silencer | 1001Striker | 2565TheSpy | 40412TrojanCow | 2001UglyFtp | 23456WebEx |1001Backdoor | 1999Phineas | 2801Psyber Streaming Server | 1509Indoctrination | 6939Hackers Paradise | 456Doly Trojan | 1011FTP99CMP | 1492Shiva Burka | 1600Remote Windows Shutdown | 53001BigGluck, | 34324NetSpy DK | 31339Hack?99 KeyLogger | 12223iNi-Killer | 9989ICQKiller | 7789Portal of Doom | 9875Firehotcker | 5321Master Paradise |40423BO jammerkillahV | 121---------------------------------> 13.How Can I Monitor My Computer Without Scanner?/=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/ Again the masses think that when they have sometrojan scanner or anti-virus one they're secure.Well the best way you can check for trojans is to doit by your own.You're not sure is the trojan scannerworking correctly so start checking it alone.In this text I've included one list of software andreviews of course that will help you check your systemfor trojans. Well you always need to check which ports are opened onyour system and if you see that one of the common trojanports is open you're probably infected.*NOTE*You can check that by typing "netstat"in the MS-DOS prompt or use other softwarethat can do this for you*NOTE*Always pay attention to which files are running on yourcomputer and check for something suspicious in it likeit's name.Well I think you'll check files likeconfig.EXE,himem.exe or winlilo.exe or other funny one.Just Hex Edit them and if you find something interestinglike "SchoolBus Server" kill the running file.Make sure you're monitoring your registry and checkevery new change in it.Also be sure you monitorsystem.ini or win.ini because there're stilltrojans that restart from there.And as I told you always download software likeICQ,MIRC or some other well known program fromthe official page.Following these simple rules will help youprevent your computer from getting infected. ----------------------------------> 14.Software To Help You Monitor Your Computer/=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=/ As I told you I've included one list of softwarethat will help you monitor your computer and helpyou prevent trojan infections. +++++++++++++++----LogMonitor++++++++++++++++ Files and directories monitoring tool=====================================Version: 1.3.4Home page: http://www.geocities.com/koenigvad/Eng/Author: Vadim Dumbravanu, koenigvad@yahoo.com Log Monitor is a files and directories monitoring tool. The programperiodically checks selected file's modification time and executesexternal program if file's time was changed or not changed. Fordirectories it handles such events as files change, addition orremoval. Works under Windows 95/98/NT. It's free for personal and business use. See LICENSE.TXT forcopyright information. This file contains following topics: 1. Purpose.2. Usage.3. Some features.4. Installation.5. Uninstallation. 1. PURPOSE The program is intended for different administrators usingautomated processes. From time to time these processes stop workingor can even terminate abnormally. Sometimes processes create orupdate error log-files. Log Monitor can watch over such processesvia their log-files and warn administrators about problems. Users can watch over common network folders and see what happenswithin their directories. 2. USAGE Most of automated processes track log-files, periodically updatingthem. Accordingly, if such process will terminate abnormally,log-files cease changing. If the process did not update the log-file during selectedinterval, Log Monitor runs an external program. It can be "net sendbla bla bla", or paging program, or process restart. Log Monitorcan run a program if the file was changed too, so you can checkerror files for changes. Log Monitor can also watch over directories and handle fileschange, addition or removal events within directory tree. Log Monitor can be used as a task scheduler. NT Scheduler Serviceis uncomfortable if you need to run a task every hour for example.Using Log Monitor you can add nonexisting file, then selectinterval of 3600 seconds and the program. As long as the file doesnot update, selected program will run every hour. You can specify working time and days when program will belaunched. 3. SOME FEATURES - Several files or directories can be monitored simultaneously,each file has its own interval and is processing in a separatethread. - A list of monitoring processes stores in the configuration file. - Minimizes to the System Tray (and restores from it). - There is an ability to pause monitoring of selected files."Paused" state can be stored in the configuration file. - Works on the schedule, can check files and directories onlyduring selected time interval and days of week or month. - Many other really beautiful things. ++++++++++++----PrcView+++++++++++++ PrcView is a freeware process viewer utility that shows comprehensiveinformation about running processes. This information includes suchdetails as the creation time, version and full path for each DLL usedby a selected process, a list of all threads, memory blocks and heaps.PrcVIew also allows you to kill and attach a debugger to a selected process.PrcView runs on both Windows 95/98 and Windows NT platforms and includesWindows and command-line version of the program.This software is free and freely distributable on a non-commercial basis in the formatORIGINALLY RELEASED (PrcView.zip) with the original Copyright clause.The author expressly disclaims any warranty for this software. This software andany related documentation is provided "as is" without warranty of any kind. Distribution of the program or any work based on the program by a commercialorganization to any third party is permitted only with the written permission of the author If you encounter a problem while running PrcView, please visithttp://www.teamcti.com to obtain the latest version. If you still have problems,please send a short description to: IgorNys@writeme.com ----XNetStat XNetStat is a program like the "netstat"command in the MS-DOS promt.The programsshows you all of the open ports of your computerand all of the established connections.Mail fresh@arez.com if you want itor have questions about it. ++++++++++++----AtGuard+++++++++++++ AtGuard is a nice firewall with some coolfeatures.It can also show you which fileopened a connection from your computerthat is VERY useful if you want to detectsome trojans on your machine.I currently lost the URL for that programbut try searching altavista.comor packetstorm.securify.com +++++++++++++++++++++++++-----ConSeal PC FIREWALL++++++++++++++++++++++++++ This software will help you to secure your PC.It has some major advantages over other PC-based firewalls.It is available on Windows 95, Windows 98 and Windows NT(3.51 & 4.0).This is probably the best firewall for Windows machinesthat will help you block trojans ports on your machineand also against various D.O.S attacks. +++++++++++++++++----LockDown2000++++++++++++++++++ This is really good anti-trojan package that detectsa LOT of trojans and other tools and also acts as a firewall,protect you against nuke and ICQ attacks.It alsoblock file sharing so you won't have problems with it.It's updated regulary with many new trojan definitions.A must have for those of you that want to be protectedagainst attacks and trojan infections. You can get it at http://www.lockdown2000.com ++++++++++----TDS-2+++++++++++ Trojan Defence Suite is also one very goodanti trojan package with a lot of functions andplugins in it.It also detects probably all of the trojans out there and is regulary updated.A must have for those of you that want to be protectedagainst attacks and trojan infections. You can get it at http://www.tds.diamondcs.com.au Using all of these tools of course with the anti-trojanpackages will result in one SECURE against trojansWindows machine so go and get them. 15.Placing BackDoors In Programs/=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/ The people that infect with trojans are becoming smarter.They started placing the trojans in some real programs thateveryone is using so they can infect the victim.Most of the people know that when they run a trojannothing will happen or an error message will apear,butwhen the trojan is "joined" with another programthe program will work normally without any error messagesand the victim will think that he/she is not infected.That's not right.Programmers made such programs thatjust "join" two or more executables in one so theycan place the trojan in some programs that everyoneknow about.Such well known programs with open source arealso very dangerous.Good programmer may modifythe source and make it like a trojan so let'ssay you're using modified e-mail client.As wellall know the password sending trojans use port 25to send the e-mail with the information.How aboutif the attacker modified the e-mail client to sendyour e-mail password to him/her.You'll of coursesee(if you're monitoring)that port 25 is open butprobably you won't pay attention because you're sendinge-mails and that's why the port is open.As I said people are becoming smarter and smarter.---------------------------------> 16.Advices/=-=-=-=-=-=/ Some advises from me to help you preventbeing infected by trojan or virus. [1]-Never accept file even it is from some friend.You're never sure who's on the other side of the computer.[2]-When executing file first check it's typesomeone may try to trick you into running it.[3]-Always monitor your open ports and the running fileson your computer.[4]-Download software ONLY from it's official page.[5]-When playing with trojans you can also get infectedbecause the creators some time put the server in the clientso when you run the client you also get infected.This shows youonce again that trojans are dangerous and when you make mistakeyou can lose sensitive information.[6]-Become a paranoid it's more secure.People laugh at these peoplethat burn every paper they have,that keep all of their passwordsin their minds,that always use encryption,that don't ICQ or IRC becausethey know how weak these protocols are BUT that's why these people neverget caught because they know how to protect themselves.------------------------> 17.Final Words/=-=-=-=-=-=-=-=/ That's it for now I'll update this text in future too.Btw this was my biggest and well writer text for now and I really like italso I hope it will help to those of you that want to know how to protect fromtrojans and want to learn more about them.Once again this is a security relatedtutorial as I told I've starting writing such texts from now.Also check out my magazine at blackcode.com/bc-tech/magazine.php3 This guide is for educational purposes only I do not take any responsibility about anythinghappen after reading the guide. I'm only telling you how to do this not to do it. It's your decision.If you want to put this text on your Site/FTP/Newsgroup or anything else you can do it but don'tchange anything without the permission of the author.I'll be happy to see this text on other pages too. All copyrights reserved.You may destribute this text as long as it's not changed. ©TheManiac UPAM DA JE ZDEJ BL JASN.......... Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
majica 11. julij 2004 Prijavi Deli 11. julij 2004 Ne...ker se mi ne da tega brat...jez dam sam 'delite'...upam, da je to dovolj... Citiraj majic@ Рубашк@... 襯衣... 셔츠... のワイシャツSpremeni sebe in spremenil boš ves svet! http://imagecache2.allposters.com/images/pic/SIGN/75035~I-Am-Perfect-Posters.jpg Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 http://www.kaspersky.com/trials?chapter=14...nlink=149405045 TUKI MAŠ TRAIL .......POSKUSNI 15 DNEVNI ANTIVIRUS K JE PO MOJE NAJBOLŠI..............PA KLIKN NA ZADN LINK..........GOOD LUCK Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
majica 11. julij 2004 Prijavi Deli 11. julij 2004 Bohve, kaj mi boš uturil... a nej ti verjamem? Citiraj majic@ Рубашк@... 襯衣... 셔츠... のワイシャツSpremeni sebe in spremenil boš ves svet! http://imagecache2.allposters.com/images/pic/SIGN/75035~I-Am-Perfect-Posters.jpg Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 JA..........HEHEHE..........SEJ MAŠ F-SECURE.......NIMAŠ SE ČESA BAT....SI BL VARNA K SEX S KONDOMOM Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
majica 11. julij 2004 Prijavi Deli 11. julij 2004 JEBE SE MEN KVA SE TEB ZDI se jebe in jebe se mu... Citiraj majic@ Рубашк@... 襯衣... 셔츠... のワイシャツSpremeni sebe in spremenil boš ves svet! http://imagecache2.allposters.com/images/pic/SIGN/75035~I-Am-Perfect-Posters.jpg Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 pa kaj tak dolgi post, nodai to na privat TO JE ZA VSE ...........TUT ZATE Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
El Nino 11. julij 2004 Prijavi Deli 11. julij 2004 JA..........HEHEHE..........SEJ MAŠ F-SECURE.......NIMAŠ SE ČESA BAT....SI BL VARNA K SEX S KONDOMOM a ti meni praviš da je večja možnost da kaj staknem s kondomom kot brez hehe, to dobi človek če je krnaprej online, kaj stakne, noben program ne nuca... razen moj seveda, Citiraj Rad bi se z vami družil tudi v živo, povejte mi če se kdaj mudite v moji okolici LJ, Moste. Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 HAHAHA....EL NINO..........JA TKO TO JE ČE SI SKOS U AKCIJI PREJ KO SLEJKO...........KEJ STAKNEŠ..........PA TI NBEN KONDOM NE POMAGA.............RES JE Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
FLEGMA 11. julij 2004 Prijavi Deli 11. julij 2004 S ČIM PA TI VARUJEŠ SVOJO ŠKATLO??? Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
El Nino 11. julij 2004 Prijavi Deli 11. julij 2004 slišal sem že za več kondomov ki so počili kot za tiste k so zdržali hehe, hecno če pomislim, koliko viusov zaustavi sistem, pol ga pa preklinjamo zarad enga k je šel mimo haha, 100% zaščita je da si offline, seveda to je zanič alternativa, vse ostalo pa boljš da si tough in znaš računalniško prvo tretjo in četro pomoč, da maš ene tri rezerve poznaš računalničarja, imaš količinski popust pri lokalni trgovini jasno kanček sreče, ala moj tibetanski varuh hiše nad računalnikom hehe Citiraj Rad bi se z vami družil tudi v živo, povejte mi če se kdaj mudite v moji okolici LJ, Moste. Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Vojko 11. julij 2004 Prijavi Deli 11. julij 2004 slišal sem že za več kondomov ki so počili kot za tiste k so zdržali hehe, hecno če pomislim, koliko viusov zaustavi sistem, pol ga pa preklinjamo zarad enga k je šel mimo haha, 100% zaščita je da si offline, seveda to je zanič alternativa, vse ostalo pa boljš da si tough in znaš računalniško prvo tretjo in četro pomoč, da maš ene tri rezerve poznaš računalničarja, imaš količinski popust pri lokalni trgovini jasno kanček sreče, ala moj tibetanski varuh hiše nad računalnikom heheŽivijo El Nino Pa veš, da računalnik ni varen niti takrat, ko je izklopljen! Napade ga črv, ki se imenuje "ZOB ČASA" Lp, Vojko Citiraj Si želiš več od življenja?Privošči si življenjski coaching!Vojko J Kalane: vojko@9zvezd.comt: @vojko_9kit: @vojko629 Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Volk K.L. 26. julij 2004 Prijavi Deli 26. julij 2004 Pa saj ne moreš več slediti novim virusom. Citiraj Ja sam ka mali pao s lipe Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Mateja 29. julij 2004 Prijavi Deli 29. julij 2004 Ej, Bu, a jih Norton in Stinger zaznata ... Citiraj funchi.si Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Guest sstane 29. julij 2004 Prijavi Deli 29. julij 2004 Ej, Bu, a jih Norton in Stinger zaznata ...Ne, samo Buda Citiraj Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Mateja 29. julij 2004 Prijavi Deli 29. julij 2004 ( sam ni čist res, me je dons brat klical, da naj prečekiram kako je kaj z virusi, ker mu ena pošta od mene baje uletava ) Citiraj funchi.si Link to comment Deli na socialnih omrežjih Več možnosti deljenja...
Recommended Posts
Pridruži se debati
Objaviš lahko takoj in se registriraš kasneje. Če si član, se prijavi in objavi pod svojim računom.
Note: Your post will require moderator approval before it will be visible.