Monday, September 6, 2010

CREATION AND REMOVAL OF A TROJAN HORSE FOR EMAIL BOMBING AND DATA STEALING

GAME APPLICATION (TROJAN)

STEP: 1 The project is designing a Trojan horse for email bombing the contacts in Microsoft Outlook Express.

STEP: 2 The front end application of the Trojan horse is an attractive game application which is downloaded by the user.

STEP: 3 This game application is a combined application consisting of the Trojan horse.

STEP: 4 This Trojan horse is a hidden application which is a java program which reads the contacts present in the Microsoft Outlook Express.

STEP: 5 User is required to RUN only the GAME APPLICATION in this case CHOPPER.EXE.

STEP: 6 The user should have the Microsoft Outlook Express installed in it with few contacts also present in it.

STEP: 7 These contacts are the inputs for the Trojan process.

STEP: 8 Even if the user closes the GAME application the Trojan continues to execute until it finishes sending Email bomb to all the contacts.

PHISHING ATTACK

STEP: 1 To launch a phishing attack on a local area network we need to configure the HOST file present on the client system.

STEP: 2 The following ip addresses are to be configured on the HOST file.

Duplicate Server-169.254.12.237

Original Server-169.254.201.188

Client-169.254.143.153

STEP: 3 The user has to click on the link which he receives from the Email Bomb content.

STEP: 4 When the user clicks on the link he will be redirected to the original server where the sign-up link for the duplicate server exists.

STEP: 5 When user clicks on the sign-up link he will be redirected to the duplicate server where he is asked to enter the details.

STEP: 6 The user has to enter his name, password and his nickname.

STEP: 7 These details are stolen and stored on the duplicate server. Also the user will be redirected back to original server.

REMOVAL TOOL

INSTALLING THE WINDOWS SUPPORT TOOLS

STEP: 1 Install the windows support tool which is the update from Microsoft Corporation.

WindowsXP-KB838079-SupportTools-ENU is the update

STEP: 2 To install this update in windows 7 we need to make this program compatible with windows vista by changing its compatibility. We have to run this program as Administrator.

STEP: 3 Install this program completely to get the IPSECCMD.EXE command line support tool

STEP: 4 We require polstore.dll to run the support tool place the polstore.dll in both the system32 and support tools in program files.

TO KILL THE PROCESS

STEP: 1 To kill a particular process run the processkill.java which calls the processkilling.bat which kills the Trojan process.

STEP: 2 To directly kill the process we can run the processkilling.bat

TO BLOCK ALL THE TCP PORTS

STEP:1 To block all the TCP ports we can run tcpblock.java which calls the tcpblocking.bat

Which blocks all the tcp ports.

STEP: 2 To directly block all the ports we can directly run the tcpblocking.bat.

TO UNBLOCK ALL THE TCP PORTS

STEP: 1 To unblock all the TCP ports we can run tcpublock.java which calls the tcpublock.bat

Which unblocks all the tcp ports.

STEP: 2 To directly unblock all the ports we can directly run the tcpublock.bat

No comments:

Post a Comment

Search This Blog