Monday, May 17, 2010

Endometrial Palups And Bloating

Fake? Antivirus you use?

This article is to challenge your privacy on the net ..
we really protected? Your antivirus is updated?
For even I can only say a sentence that is among my favorites:

"An anti-virus is as effective as the ignorance of who installs it"

Today I'll show you why you should have basic knowledge when it comes to be protected!
you trust your anti-virus? Maybe some anti-spyware .. But really we are safe from these criminals cyborg?

Note: I'm not a hacker or anything, this material is merely EDUCATION .. Insite want education on computer security rather than the morbidity of espionage!

Let's start with the main concept of theme

TROJAN: According to wikipedia, is called Trojan or Trojan horse (literal translation from English Trojan horse) to a malicious software under a harmless looking covertly runs in the system and allows remote access to an unauthorized user to the system. The term comes from the story of the Trojan Horse mentioned in Homer's Iliad

A Trojan is a computer virus the main differences are that the Trojans do not spread the infection to other systems themselves and need to receive instructions from an individual to perform its purpose.

(As he says, what we do is attach a malicious software program to manipulate remotely healthy)


But .. Our "victim" has "Antivirus", no problem =)

Luckily for activities such systems are to leave totally undetectable! Encrypting
our Trojan will try to mock the majority of antivirus signatures and the victim never suspect that your computer is being used remotely by someone else!
do not want to teach such "illegal" but if I want to give some recommendations to get rid of these attackers!

First things first ..

file we created our malware, encrypt, verify that is 100% undetectable by those antivirus that work can be thrown away .. _______________________________





File Info Report date: 2010-05-18 2:23:11 (GMT 1)
File name: Server-LxP.exe
File size: 369714 bytes MD5 Hash
: 2fe8ce8bfc62a1216382ac8cb09d1220
SHA1 Hash: c130239ba05ee90e438831d1f58e8bb4541dc709
Detection rate: 0 on 20 (0%)
Status: CLEAN


detections
a-squared - -
Avast - -
AVG - -
Avira AntiVir - -
BitDefender - -
ClamAV - -
Comodo - -
Dr.Web - - F-PROT6
- -
G-Data - -
Ikarus T3 - -
Kaspersky - -
McAfee - -
NOD32 - -
Panda - - Only
- -
TrendMicro - -
VBA32 - -
VirusBuster - -
Zoner - - _____________________________________



PERFECT! . Has been completely free from 20 different antivirus signatures!
it attached to a program (ares, msn, emule, including a virus that hill lol) = P hahaha .. We climbed to a download site (not give examples of sites not to any specific menosprestigiar).

is that I want to do a test as 100% expression, I have attached a "virus" and I uploaded the program to a web .. Waiting for someone to download our "program (virus)" to "clean" your computer .. But oh, = P Inside the Trojan Horse is our .. Just simply double-click on the installer .. and will be installing the "Antivirus and trojan "

And this is the result:





what not? =) As you may know that your antivirus SUPER I have now same total control of your computer? Things to think = S
And more when we think we can fall into dangerous hands .. This is just an "example" but it's more mention could be another person with other goals!
I've taken the liberty of making these images that this is "seeing is believing" whole life = p hehehe ..

Now I will mention a little about that could make these bad boys, I have listed the second image and explain to, the functions of this malware:

1. FILE MANAGER: Handling
full to the files on your pc .. C: D: desk, removable drives, and any existing folder on your computer.

2. KEYLOGGER:
records all the keystrokes of computer polluted ... Not dangerous? = S

3. PROGRAMS INSTALLED:
can see all programs and programs secretly DESISTALAR the victim ..

4. AUDIO CAPTURE:
If our amigito has micro .. can activate and listen to everything he says about the =)

5. ESCRTORIO REMOTE
is what we see in the second image, we have your desktop as our own! to see what he does and to use ..

6. CAPTURE WEBCAM:
This turns the webcam on our amigito without their consent)

7. EXTRA OPTIONS:
very functional, this can restart, shutdown, lock your keyboard, your mouse, hide your icons, the windows bar and amongst other more!

8. PASSWORD:
Displays all passwords that have been marked on the computer of the victim

9. WEBSITE OPEN: Opens
website without the consent of the "victim"

10. SEND FILE:
Perhaps the strongest ... With this option you can send a file and run to get visible or hidden mode! Either could destroy a computer by sending a simple virus. Bat erasing all the disk C:


INCREDIBLE NO? ... Well .. This is reality! I do not want to despair and think that everything is lost hehehe but I do not want you're quiet .. Your privacy is 100% discuss and question .. not leave everything up to a cheap or expensive antivirus!
invited you to discover how to be more effective than a virus!
In the upcoming article on how to get rid of these malware manually .. Know where to stay, what is their function to be "undetectable", which has intentions "cyberdelincuente you" and among other things ...


NOTE: I repeat, I am not any kind of "cyberdelincuente" This material is merely EDUCATION .. Desmostrando so we are not 100% protected Insite computer security education and


By PUZZLE ..

0 comments:

Post a Comment