How to Make a Trojan Horse : Steps
Types of Trojan Horse :-
- Perfect Keylogger : Records keystrokes , so basically everything that you are typing will be recorded.
- Botnets : It is a network of Trojan Horse. It is used to control or steal data from lots of devices.
- Spyware : Records stuff like keystrokes , audio , webcam , screen ,browser logs.
That was some basic introduction on Trojan Horse . Trojan Horse can be made using any programming language but RAT software’s can be used to make Trojan Horse without coding. one such RAT software is DARK COMET.There are other Trojan horse also like the famous ones are beast, cyber gate, girlfriend etc.
Now I am going to show you How to make a Trojan Horse with the help of a very user friendly tool DARK COMET and also how to protect yourself from these things.
Step 1 : Download the Software
First of all you need to download DARK COMET from internet.Extract the zip file and install DARK COMET on your PC.After successful installation you will be able to see the icon on your desktop as you see here in the screenshot.
Step 2 : Full Editor Mode
Double click on the DARK COMET .Accept the terms and conditions.A screen will appear on the top left of the screen you will see an option “RAT COMET” Click on it and then select server module and click on full editor as shown here in this screenshot.Now you are set to make a Trojan Horse.
Step 3 : Configuring the Trojan Horse
After clicking on full editor you will get all the options listed in a user friendly manner. you can choose what message will appear when your victim will click on the icon then you can also choose options like disable firewall , choose persistent process (if killed then it will come back) , you can choose your icon and there are lots of stuff to choose according to your needs.
On the right side there will be an option called network settings.There type in your IP address and change the port number to 999 as DARK COMET listen on port 999.In case you don’t know how to find out the ip address. since mostly people use windows operating system all you need to do is open your command prompt and type ‘ ipconfig ‘ and press enter , your IP address will be displayed on the command prompt.So your Trojan Horse is now fully configured.
Step 4 : Testing Our Trojan Horse
After you have completed all this just click on build the stuff and your Trojan Horse will be created.Here I have created a Trojan Horse called Facebook hacker ,You can try if your icon works properly or not in a parallel operating system through VMware Virtualization .You need some social engineering techniques so that your victim is convinced that it is a useful application and they should install it in their PC.As soon as your victim double clicks on this icon you will gain complete access to your victim’s PC.Now you can wreak havoc on their PC.
Protect Yourself From Trojan Horse :-
Here I have listed some of the tools that help protects you from such Trojan Horse which are available on the internet .
- KEY SCRAMBLER : It protects from key-logger by encrypting everything that you type in the kernel.
- SANDBOXIE : It runs your program on an isolated space so that it does not affect the whole system.It also prevents them from making permanent changes in the system.
- FIREWALL : It protects you from unauthorized access from a network .It controls the incoming and outgoing traffic.
- ZONEALARM : It is a firewall that protects you from intrusions and online threats.
In several black markets of the internet undetectable Trojan Horse are also being sold. Trojan Horse can be the best buddy for any hacker and Trojan Horse have played a very crucial role in the life’s of many IT security professionals.To build undetectable Trojan Horse you just need to know one programming language.
One of the most dangerous banking Trojan Horse was ZEUS which destroyed the life of many.ZEUS Trojan Horse was one Trojan Horse which was undetectable and hacked many computers.This Trojan Horse hacked about 74000 FTP accounts and also websites like Oracle, NASA ,Bank of America etc.
If you like the guide then do share it among your friends and in case you have any doubts or suggestion then you can comment us below.
0 comments:
Post a Comment