GAME APPLICATION (TROJAN)
STEP: 1 The project is designing a Trojan horse for email bombing the contacts in Microsoft Outlook Express.
STEP: 2 The front end application of the Trojan horse is an attractive game application which is downloaded by the user.
STEP: 3 This game application is a combined application consisting of the Trojan horse.
STEP: 4 This Trojan horse is a hidden application which is a java program which reads the contacts present in the Microsoft Outlook Express.
STEP: 5 User is required to RUN only the GAME APPLICATION in this case CHOPPER.EXE.
STEP: 6 The user should have the Microsoft Outlook Express installed in it with few contacts also present in it.
STEP: 7 These contacts are the inputs for the Trojan process.
STEP: 8 Even if the user closes the GAME application the Trojan continues to execute until it finishes sending Email bomb to all the contacts.
PHISHING ATTACK
STEP: 1 To launch a phishing attack on a local area network we need to configure the HOST file present on the client system.
STEP: 2 The following ip addresses are to be configured on the HOST file.
Duplicate Server-169.254.12.237
Original Server-169.254.201.188
Client-169.254.143.153
STEP: 3 The user has to click on the link which he receives from the Email Bomb content.
STEP: 4 When the user clicks on the link he will be redirected to the original server where the sign-up link for the duplicate server exists.
STEP: 5 When user clicks on the sign-up link he will be redirected to the duplicate server where he is asked to enter the details.
STEP: 6 The user has to enter his name, password and his nickname.
STEP: 7 These details are stolen and stored on the duplicate server. Also the user will be redirected back to original server.
REMOVAL TOOL
INSTALLING THE WINDOWS SUPPORT TOOLS
STEP: 1 Install the windows support tool which is the update from Microsoft Corporation.
WindowsXP-KB838079-SupportTools-ENU is the update
STEP: 2 To install this update in windows 7 we need to make this program compatible with windows vista by changing its compatibility. We have to run this program as Administrator.
STEP: 3 Install this program completely to get the IPSECCMD.EXE command line support tool
STEP: 4 We require polstore.dll to run the support tool place the polstore.dll in both the system32 and support tools in program files.
TO KILL THE PROCESS
STEP: 1 To kill a particular process run the processkill.java which calls the processkilling.bat which kills the Trojan process.
STEP: 2 To directly kill the process we can run the processkilling.bat
TO BLOCK ALL THE TCP PORTS
STEP:1 To block all the TCP ports we can run tcpblock.java which calls the tcpblocking.bat
Which blocks all the tcp ports.
STEP: 2 To directly block all the ports we can directly run the tcpblocking.bat.
TO UNBLOCK ALL THE TCP PORTS
STEP: 1 To unblock all the TCP ports we can run tcpublock.java which calls the tcpublock.bat
Which unblocks all the tcp ports.
No comments:
Post a Comment