Trojan Construction Kit
Trojan Construction Kit allow the attacker to create their own Trojans. These customized Trojans can be more dangerous for the target as well as an attacker if it is not executed properly or backfires. These customized Trojans created by using Construction kits can avoid detection from virus and Trojan scanning.
Some Trojan Construction Kits are: -
Dark Horse Trojan Virus Maker
Senna Spy Generator
Trojan Horse Construction Kit
Progenic mail Trojan Construction Kit
Pandora's Box
Droppers
A dropper is a software or program that is specially designed for delivering a payload on the target machine. The main purpose of Dropper is to install malware codes on to the victim’s computer without alerting and avoiding detection. It uses various methods to spread and install malware.
Trojan-Dropper Tools
TrojanDropper: Win32/Rotbrow.A
TrojanDropper: Win32/Swisyn
Trojan: Win32/Meredrop
Troj/Destover-C
Wrappers
It is a non-malicious file that binds the malicious file to propagate the Trojan.Basically, Wrapper binds a malicious file in order to create and propagate the Trojan along with it to avoid detection. Wrappers are often popular Executable file such as games, music and video files, as well as any other non-malicious file.
Crypter A Crypter is software used while creating Trojans. The basic purpose of Crypter is it encrypt, obfuscate, and manipulate the malware and malicious programs. By using Crypter for hiding a malicious program, it becomes even more difficult for security programs such as anti-viruses to detect. It is popularly used by hackers to create malware which is capable of bypassing security programs by presenting itself as a non-malicious program until it gets installed. Some of the available Crypter to hide malicious programs are: - Cryogenic Crypter Heaven Crypter Swayz Cryptor Remote Access Trojans (RAT) Remote Access Trojan (RAT) allows the attacker to get remote desktop access to victim's computer by enabling Port which allows the GUI access to the remote system. RAT includes a back door for maintaining administrative access and control over the victim. Using RAT, an attacker can monitor user's activity, access confidential information, take screenshots and record audio and video using a webcam, format drives and alter files, etc. The following are the list of RAT tools: - Optix Pro MoSucker BlackHole RAT SSH-R.A.T njRAT Xtreme RAT DarkComet RAT
Comments
Post a Comment