.: OS Tips and help  :.
Windows XP
Windows 98
Windows 95
Mac
.:This and That :.
Handling Virus Hell
Email 
Firewalls
Desktop Fun
File Management
File Types
IP Addys
Spyware
Burning CD's
Software Types
Screen Resolution
Spammer Revenge
Tech Lingo?
What The Hell Dammit?
.: Tweeks and Tricks :.
REG Edit
Maintenance
Hard Drive Tweeks
BIOS tweeks
Memory tweeks
Modem Tweeks
Video card tweeks
3D FX Tweeks
Clocking your CPU
CD ROM Tweeks
 Tutorials
HTML
Java Script
CSS
Paint shop Pro
 
 

  Security Columns

 

Trojans ~Sub7

April Griffin

empire_editors@yahoo.com

http://aprilgriffin.tripod.com

Download Swat It Completely FREE program that scans your files for Trojans, Worms, Bots and other Hacker programs

A trojan is like having remote control over a computer. Many kiddy scripts out there have trojans hid inside them unbeknownst to the  bully using them they have fallen prey. Poetic justice in a way.  Other kiddy scripts  implant them. Lets have an in-depth look at a trojan so you can see the implications this has.

Sub 7 was created by mobman - after fooling around with netbus  he simply reversed netbus and got subten which he later changed to subseven or so the underground rumour mill tells me
When the server program is installed, the computer is exposed to  attacks. Once the connection is established, the attacker can acquire sensitive information such as passwords and  it gives them total control of your computer and they can monitor and record everything you do. That can give hackers the power to devastate you once they have gathered enough information. I have a couple screen shots of sub 7 for you here as well as what comes with it.

Main Distributed Package:
Arrives in a zip file called Sub717.zip containing 
  1. server.exe - Server (325k)
  2. Sub7.exe - Client (458k)
  3. EditServer - Server configurator (182k)
+ a readme.txt file.
Name: Sub 7
Version: Current Version 1.7
File Sizes: See Above
Affected Operating Systems: Win95 & 98 - NT???
Listen ports (default): 1243, 6711, 6776 TCP
Startup Routine: Registry
Written in: Unknown
Severity: Medium/high Risk
SETUP SERVER. you can setup the server before sending it to the victim.
PACK the server.exe with another EXE file
or with an image.
Change the victim's resolution.
E-mail notify.
See all the running processess [visible or not]
Print feature! allows you to specify a text to be printed on the victim's printer
Registry editor. 
Find files feature. 
ScrollLock, CapsLock, NumLock can be turned ON and OFF
Disconnect victim. hangs up the victim's connection to the net
Focus window
Screen Preview (screen dump)
ICQ notification
Show image feature.
Continuous screen capture is finally here!
Flip screen.
Hide/show the victim's desktop icons.
FTP server.
Message manager.
Enable or disable Ctrl-Alt-Del.
Send keys.
Open the default browser at the specified address
Hide or show the Start button
Disable keyboard
Chat with the victim.
Start/stop the victim's PC Speaker.
Restart windows.
Open/close the CD-ROM
Set the length of the victim's mouse trails.
Get all the active windows on the victim's 
computer. after that you can:
    - close a specified window
    - enable/disable a specified window 
[the victim will or will not be
      able to interact with it]
    - disable the close button on a specified window
    - hide or show a specified window
 Get a list of all the available drives
on the victim's computer
 Turn monitor on/off.
 Show/hide the taskbar.
 Get system information like: windows version, 
user name, company name, screen resolution, etc.
 Keylogging
 Record Audio.
 File manager.
 Reverse/restore mouse buttons.
 Get passwords.
 Offline key logger.
 Trojans can hide in just about anything 
and can look like truly legit progs, sub
 seven in particular because it is so small. 
At first it was thought to be a minor pain 
but has proven to be a giant kick in the
head with a golf shoe 
To protect yourself please read the
 ip addy section, firewall section and my 
security column entiled "feeling lucky punk?" 
to learn how to maximize, test  and expand your
port hiding skills.
If you would like to get revenge on a lamer
who sent you sub seven, run EditServer.exe
and open up the Sub7 server file. If it's not
you can view their ICQ UIN or email address. 
'PING their ip to find there IP's hostname, 
real name and phone number and mailing adress 
if you go about it right. Notify their ISP.
Download NetSpyHunter *FREE* NetSpyHunter monitors ports and scans your registry/hard drive for trojan activity. It prompts you with a message box and sound when an intruder is detected. It also scans Windows registry/hard drive for trojans. It features an automatic listen mode at start-up
 

 

   
 
.: Applications :.
Must have downloads
Software Reviews
.: Internet Explorer :.
Tweeks and Perks

Messengers and Chat

Yahoo Messenger Help
Yahoo Messenger Security
Yahoo Needfull Things
MSN Messenger
ICQ
AIM
Yahelite
MIRC
Trillion
Knob control
Report a booter

.: Archived Columns :.
Internet Etiquette
Security Columns
Opinion Columns
How To Columns

Mac Columns

.: Search :.
 
Need To Find Something Fast?
© 2002-2003 Empireezine.tripod.com