|
This property was reserved by
helper15
on
July 9, 2000 Hi, Welcome to "DATA" (Defence Against Trojan Attacks". In this site we will educate and inform you about the internets most malicious and dangerous tool, the trojan. I will dicuss several topics to help you understand and provide you with alot of information without getting technical because we all know if you were knowledgable you would not be here!! We will be basic and to the point. This is written with the help of Steve Hensly & former hackers "rULzS",bLEEp & Target..who's help and experience in this field will benefit everyone who is worried about these attacks! Now we will discuss serveral topics beginning with: 1)Origin of the term "Trojan Horse": A destructive program that masquerades as a benign application. Unlike a viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from a story in Homer's Iliad, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy. 2)"Who are more likely to receive it and how?? This can be answered very easily. ANYONE!! You say how?? There are many ways one may obtain a trojan into their computer. The trojan 99% of the time comes with a "client" (the program used by the person SETTING YOU UP.....and a "server" ...<---this is what the person WILL SEND YOU). They are usually .exe programs. Now the sneaky part is to "How do I get the server to my victim??!!" Easier done then said!! First off I could just simply SEND THE SERVER via email or file tranfer thru ICQ,mIRC or any other chat service that allows file transfers. The server can be any size from 15k up to 800k. Once you receive the server and you CLICK IT OPEN, it will do NOTHING. Yep,nothing will show up. Bingo...he's IN! Another way is to bind the server (join it together)with a program called "The Joiner" onto a .exe program or a video(midi or .avi etc.). So you think your getting just a funny animated cartoon or game or a cool video of some dancing baby?? Well,once you click onto to it and view that dancing baby or whatever...you have launched the SERVER ALSO!! Even though it seems harmless at first "dancingbaby.exe" it CAN BE DONE this way! Another way is to simply put the SERVER on a floppy and if he has access to your pc it can be launched in about 1 minutes time! There are other crafty ways to get the server opened on your computer but I believe you get the point. IT CAN BE EASILY DONE!! I have infected the same person 3 times by being sneaky about it!! 3)OK..."What can this Trojan do once it has infected my pc?" Well...You think getting a virus is bad?? Think again!! Here is what could possibly happen to your computer. And believe me, THIS IS ABSOLUTELY TRUE!!! Especially in the hands of a vicious hacker-wanna-be!!
a)obtain ALL your passwords...including Recorded,Cached & RAS. And yes...AOL,ICQ etc.!! I knew someone who would log onto AOL with the password that he obtained...log onto THERE account...(as long as they were offline)...and then use THERE AOL ACCOUNT to mess with people!! Talk about covering there butts!! If he DID GET CAUGHT it would reflect back UPON THE AOL ACCOUNT!!! WOW!!! This is SERIOUS!!! b)How about being able to download ANY (and I mean ANY) FILE off your computer!! Your Stock info?? NO PROBLEM. Your Microsoft Data entry?? NO PROBLEM. Your DEEP HIDDEN FILES of TOP SECRET STUFF??? NO PROBLEM. Your photos?? NO PROBLEM. GET MY POINT??!! ANYTHING and I mean ANYTHING can be subject to viewing by the "client"!! c)Some Trojans can even FORMAT your hard drive! Now that is about as BAD as it gets. Too bad you did not save all your important files. d)How about being able to UPLOAD ANYTHING onto your computer......and then running it!!! Let's say....a dirty picture,another trojan(s). How about a virus?? They can send you ANY virus that is available thru any hacker site. I have seen sites that have at least a 1000 virus that anyone can obtain to send to people and RUN IT!! There are some so terrible out there that it will fill and kill your hard-drive in about 4 seconds and you will lose almost all your data and files that even a Data Recovery Specialist cannot recover but a small % of your data EVEN after paying him $$$$!! My friend once recieved a very small file or program called "ambulance"...about 6k in size. He opened it up. His screen went into the DOS mode. There in front of him was a cartoon looking ambulance that drove up along the bottom of his screen. Out walked two guys with a stretcher and appeared to pick up a computer they walk it back to the ambulance. His computer then CRASHED. NOTHING. e)I know of one trojan that can do about 500 OPTIONS! It can KILL your keyboard, one letter or the WHOLE THING...Totally CONTROL YOUR MOUSE....get into your registry...many,many MORE THINGS to make your life on your computer miserable!!
|
|