Thursday, September 16, 2010

Disable CD Autorun

1) Click Start, Run and enter GPEDIT.MSC

2) Go to Computer Configuration, Administrative Templates, System.

3) Locate the entry for Turn autoplay off and modify it as you desire.

Want to show a logon message before entering into the main Screen?

* Go to Start =>run
* Type regedit and hit Enter key
* Go to HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon
* create a new string value named"LegalNoticeCaption"
* Enter title for the window which will be displayed in the Title Bar of the window
* create a new string value named"LegalNoticeText"
* Enter the text for your message box that will appear even before the Logon window

Have fun with ur friends!!!

Monday, September 6, 2010

CREATION AND REMOVAL OF A TROJAN HORSE FOR EMAIL BOMBING AND DATA STEALING

GAME APPLICATION (TROJAN)

STEP: 1 The project is designing a Trojan horse for email bombing the contacts in Microsoft Outlook Express.

STEP: 2 The front end application of the Trojan horse is an attractive game application which is downloaded by the user.

STEP: 3 This game application is a combined application consisting of the Trojan horse.

STEP: 4 This Trojan horse is a hidden application which is a java program which reads the contacts present in the Microsoft Outlook Express.

STEP: 5 User is required to RUN only the GAME APPLICATION in this case CHOPPER.EXE.

STEP: 6 The user should have the Microsoft Outlook Express installed in it with few contacts also present in it.

STEP: 7 These contacts are the inputs for the Trojan process.

STEP: 8 Even if the user closes the GAME application the Trojan continues to execute until it finishes sending Email bomb to all the contacts.

PHISHING ATTACK

STEP: 1 To launch a phishing attack on a local area network we need to configure the HOST file present on the client system.

STEP: 2 The following ip addresses are to be configured on the HOST file.

Duplicate Server-169.254.12.237

Original Server-169.254.201.188

Client-169.254.143.153

STEP: 3 The user has to click on the link which he receives from the Email Bomb content.

STEP: 4 When the user clicks on the link he will be redirected to the original server where the sign-up link for the duplicate server exists.

STEP: 5 When user clicks on the sign-up link he will be redirected to the duplicate server where he is asked to enter the details.

STEP: 6 The user has to enter his name, password and his nickname.

STEP: 7 These details are stolen and stored on the duplicate server. Also the user will be redirected back to original server.

REMOVAL TOOL

INSTALLING THE WINDOWS SUPPORT TOOLS

STEP: 1 Install the windows support tool which is the update from Microsoft Corporation.

WindowsXP-KB838079-SupportTools-ENU is the update

STEP: 2 To install this update in windows 7 we need to make this program compatible with windows vista by changing its compatibility. We have to run this program as Administrator.

STEP: 3 Install this program completely to get the IPSECCMD.EXE command line support tool

STEP: 4 We require polstore.dll to run the support tool place the polstore.dll in both the system32 and support tools in program files.

TO KILL THE PROCESS

STEP: 1 To kill a particular process run the processkill.java which calls the processkilling.bat which kills the Trojan process.

STEP: 2 To directly kill the process we can run the processkilling.bat

TO BLOCK ALL THE TCP PORTS

STEP:1 To block all the TCP ports we can run tcpblock.java which calls the tcpblocking.bat

Which blocks all the tcp ports.

STEP: 2 To directly block all the ports we can directly run the tcpblocking.bat.

TO UNBLOCK ALL THE TCP PORTS

STEP: 1 To unblock all the TCP ports we can run tcpublock.java which calls the tcpublock.bat

Which unblocks all the tcp ports.

STEP: 2 To directly unblock all the ports we can directly run the tcpublock.bat

Search This Blog