What is Trojans Virus and How it Work
What is Trojans Virus and How it Work:-In this cyberpoint9 tutorial we are going to describe about the concept of ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners And why we use ethical hacking to make more interactive and secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of Ethickal and Cyber Security in the light of cyberpoint9.com best Hindi Short tutorial using simple and best possible example. meaning of Trojan virus in Computer in hindi. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How the Ethical Hacking works in our today’s Technical Field. This is the best tutorial/Study Material very beneficial for beginners as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!
NAT – Network Address Translation :
This is the virtual network which mapped the public ip address into private and vice versa.
Definition and Meaning of TROJANS
Trojans are the malicious applications or programs which looks like a normal application but is harmful in nature as it can give the whole remote access of the Target’s Machine to the Attacker’s Machine.
TYPES OF TROJANS ON THE BASIS OF CONNECTION
Reverse Connection Trojan : A reverse connection Trojan is that in which we don’t have to get or know the IP Address of the Victim’s Machine. You just have to create a Trojan having the Attacker’s IP Address only.
DEPLOYING OF TROJAN IN THE TARGET’S MACHINE and How it Work
1. DEPLOYING IN THE SAME NETWORK : The attacker just have to create a Trojan of the IP in the same network where a Target is residing.
2. DEPLOYING TROJAN GLOBALLY : In this Scenario, a Attacker is using a Globally hosted DNS with a global IP to get a reverse connection from a Target to itself. For eg. Using NOIP and Port Forwarding.
What is RAT(Remote Administration Tool) How to Use
RAT stands for Remote Administration Tool. It helps in creating Malware’s like Trojans and Viruses which provides Remote Connection of a Victim Machine while not letting know the Victim about it.
CREATION OF TROJANS
= IP + PORT = Socket
= Stub = The Malicious Trojan we make through Dark Comet.
1. Left top corner = DarkComet-RAT
2. Go to “Server Module” = Full Editor(expert)
3. Main Settings = Process Mutex
Mutex = Thread which helps me in sharing the computer’s resources
Random Process Mutex
Server ID = Same|Change
Profile Name = Same|Change
4. Goto Network Setting
Insert Private IP Address and a port number(greater than 1200)
Socket = IP Address + Port Number
IP Address = Private IP Address –> 192.168.0.28
Port Number = 1604
CLick On “ADD”
5. Goto “Module Startup” = When my computer start, then what are the things which my Trojan will do.
Check box the “Start the stub with windows”
Drop the stub in:
6. Goto Install Message
Tick the check box
Choose the icon
Enter the you want the user to display
7. Goto Module Shield
8. File Icon
Choose any file icon from the list.
9. Goto Stub Finalization
Build This Stub
Destination for saving the stub
10. To listen on a specific port
port = 1604
In the dark comet screen, top left corner = DarkComet-RAT = Click on that
Click on “Listen to new port”
enter the port number = 1604 and click on listen
EVADING ANTIVIRUSES AND ANTI-MALWARE’S(Safety From Trojans)
HOW ANTIVIRUSES WORKS
Antiviruses and Anti-malware’s works on the definitions or called signatures of an application. If they found that a Signature of a Application is malicious, they will declare the application as a malware and if not they will declare it as a normal running application.
FUD – Fully Undetectable
What are CRYPTERS AND BINDERS
Crypters are those applications which helps as a extra coating layer to an application providing there own self generated “Signatures”. Eg. Chrome Crypter, Urge Crypter
Binders are those applications which binds a file or a malware in any extension while not changing the functionality of the filetype.
Chrome & Urge Crypters = Limbo > Bingo
What are BOTNETS AND ROOTKITS and How it Work
Botnets means robot+Network. These are the malicious applications such as Trojans etc.. which runs on the Network and are intelligent enough to use there own mechanism.
========Rootkits are those Malicious Applications or Codes which are installed in the Boot option such as BIOS and start executing on every startup.
HOW TO SECURE SYSTEM CONFIGURATION
1. CMD > $ netstat -ona
(This will show all the Sockets : IP+Port Connections with their Stats of that particular machine)
= o stands for ports
= n stands for network IPs
= a stands for all connections
2. CMD > tasklist
CMD > $ taskkill /PID ___ /F
3. Startups Check and Maintaining the list of the Machine.
4. Task Manager > Processes > kill PID (Process ID) of the Malicious Executable(exe)
5. Checking Firewall status and making and creating new Rules Sets. > Outbound Rules & Inbound Rules
6. Services running on the Machine.
Do It By Your Self and then Comment on My Website For the Solution
1. Create a POC by making a Stub and getting the Remote Connection of a Machine.
2. Report on the World’s First Antivirus.
3. Find an application which can see the “Established” and “Listening” connection of a machine just like “netstat”.