can some one help me i want to make a detectable trojan undetectable how do i go about doing it. if someone could help me plzzz.
can some one help me i want to make a detectable trojan undetectable how do i go about doing it. if someone could help me plzzz.
To make a trojan undetectable to the antivirus, you need to know assembly code. The way you would make it undetectable would be:Originally Posted by humza
*. Somehow find the strings of code, or "signatures" included in all antivirus programs to detect viruses and trojans.
2. Find the signature of the trojan you wish to make undetectable,
*. Try to find this string of code inside your trojan by splitting it.
4. Then disassemble it and insert a few extra bits of code that would not affect the program, but would change the detectable part of code enough to make it unrecognisable to the AV.
Now, the trojan would be undetectable, because you have modified it enough for it not to be recognised by the antivirus. Of course, this is an extremely complex thing to attempt, and I don't even know any assembly or machine code, so there are definitely more things you would have to do than I have described, I am just not experienced enough to know about this. So I doubt you would be able to make a trojan undetectable, to do that you have to know machine code and assembly, which is much harder than normal programming languages like c++ because machine code is directly interpreted by the processor, you have to know about how antivirus programs work, and you have to have the right tools to use, like disassemblers etc. So basically, it's not as simple as "here, download this program and it will make all your trojans undetectable", you have to have a lot of knowledge and experience to be able to modify binary programs. If you really wanted to know, you could probably ask some of the admins and moderators of this forum, they might know, although they wouldnt help you if you said you were doing this to a trojan.
i read a post by carlo and this is actualy his and the title was "Make your trojans undetactable by Hexing Malware" find that post. maybe that will help you.
WAFFLES?!?!? OMFG WHERE?!!?
Also, if you wanted to make any program like trojan, keylogger etc. undetectable to all antivirus programs, then you could make your own packer from this tutorial:Originally Posted by Alucard
[url]http://dasomnetwork.com/~leedw/pub/writing_your_own_packer.html[/url]
If you haven't got a good knowledge of programming yet then you have no chance following this tutorial, a packer is quite a complex program. But if you could follow it through, the packer you would make would have the ability to make any program at all undetectable to all antiviruses, unless you shared it with people and got it added to the detections. Also, you could follow carlo's post about "hexing your malware", which is probably simple enough for any n00b with a hex editor to follow. His post is here:
[url]http://www.all-nettools.com/forum/showthread.php?t=222*[/url]
or the original post he took it from is here:
[url]http://www.governmentsecurity.org/archive/t*466*.html[/url]
thinking outside the box for a moment, why not program something that configures windows remote desktop for your access needs? Given this idea is OS dependant, but antivirus shouldnt pick up a program that simply calls on part of the built in programming of the operating system. Think of Remote Desktop as a windows built in trojan.
Going with that route or one similar I think you'll find it easy not to set off too many alarms.
Hope that helps.
[url]www.informationleak.com[/url]
not entirly linked to making the trojan undetectable but...
if you got into the computer initally (telnet or whatever you choose) then dropping a virus that would then disable or kill the antivirus then going about your original plan without needing to know ASM or having to make your own packer (given you dont have the programming experience or time).
But if you do have the time...take the other guys's advice of making your own creation...since its nicer to have your own creation instead of piggy backing off of someone elses work :P
Solus fines finium , es fines finium vos partum
The only limits, are the ones you create
Yes, it's always better to create your own stuff, it will not be detected, you can trust it to do what you programmed it to do, etc. Before people start asking stuff like "how do I telnet to someone's computer", you can only telnet to a computer with a telnet server running, or some other server that will allow you to connect, you can't randomly telnet to someone and expect to get in, most people do not run servers. If you did a port scan and found an exposed port that would allow you to connect, then you could telnet in and drop a virus or trojan in.Originally Posted by kOdE_krEEp
true, but i guess i am missing that alot of people dont know most entry methods into a computer and i may have misused the example of Telnet. :P
Solus fines finium , es fines finium vos partum
The only limits, are the ones you create
The only ways to turn detectables into undetectables is:
(This is not shitty stuff)
Get HEX editor and start hexing, the guy that talk about asm simply shut up over there.
Get several packers and try to combine them.
hex editing is to hard to do, i give up.
well wat did u except its no just a step. hexing is not hard you just think that hexing is hard
WAFFLES?!?!? OMFG WHERE?!!?
Originally Posted by fabioejp
I can't really understand who you are talking to, but
"the guy that talk about asm simply shut up over there"
Simply shut up about ASM? ASM (well actually machine code) is what makes up every binary program on computers and IS what you are hex editing, so you can't just ignore it and tell him to shut up. Actually I can't understand much of what you wrote, so I could have totally misinterpreted that. BTW, what you said about using two packers, well antivirus programs include packed and unpaced versions of the viruses/trojans in their detections, so this would only work if you uses a small, unknown packer or made your own.
Hi again mike.
Although as you may notice im quite good at this kind of thing but you mentioned that you can drop trojans through telnet if they have an open port that you can telnet. Would you by anychance know how to do this?
Thanks
Carlo
If they are running a telnet server (or some sort of server that will handle your connection correctly), then you telnet to the port it is listening on, issue the correct commands to transfer a file accross, then depending on how much access you have, enter a command to run the file on their computer or put it in a directory included in startup. I think I may have worded my post "drop a trojan in through an open port", they have to have a server running as with anything like this, and not many people do.Originally Posted by carlo
wwwwwwwwwwwwwwaaaaaaaaaaaaaaaarrrrrrrrrrrrrrrr