Join facebook group THE HACKER DEVIL
If you are novice hacker or even if you are new to programming and want to know from where to start your journey to programming then I must tell you most seasoned as well as new programmers will agree to start with HTML. HTML can not be really considered as programming language but still its always better to start with something that's easy and mostly used. As a first time programming student many people get horrified with variables, commands, symbols, scripts etc. Head First HTML is designed to tackle all those problems and make learning enjoyable
Create Telnet Trojan For Windows Xp
Following batch script will act as Telnet Trojan to any windows XP system, the best part of it is it's fully undetectable to all ant-virus programs. Copy following lines in notepad and save with any name with .bat extension for example Trojan.bat.
Packet Sniffers/Network Packet Sniffers
Packet sniffer, network packet sniffer or simply sniffers are programs or devices that can monitor data traveling over a network. They usually work by capturing packets from Data Link Layer(read OSI model for more information) and hence called as packet sniffers. They can be used for legitimate as well as illegitimate activities. Legitimate activities include network traffic monitoring and administration where as illegitimate activities may include stealing passwords,
Trojan Vectoring Using One EXE Maker
One EXE maker is file wrapping software that can be used for Trojan vectoring. It binds two or more executable files together and also provides options for running program in hidden mode or visible mode.
Vectoring Trojan Using Extention Hiding | False Linking/Fake Shortcut
This is another method of vectoring Trojan by extension hiding. In fact you can hide any file's extension using this method. This method is better known as False Linking or Fake Shortcut. To use this method while creating your Trojan server using RAT client bind it with file whose extension you want to use,
Wrap Trojan Using Iexpress Wizard
As discussed earlier in Trojan Software Vector windows iexpress wizard can be used as Trojan wrapping tool. In this following tutorial I ll explain how you can create your own Trojan wrapped file and then its countermeasures. Following are requirements for this demonstration,
How To Avoid Trojan Infections
Trojan Software Vector
Trojan software vectors or simply Trojan vectors are files that are created for spreading Trojans. Some people also call them as Trojan backdoor and virus vectors. No matter how many names you give them the real motive of Trojan vector is spreading Trojans by means of files. Here we will have a theoretical view on some of the methods and then study them one by one in upcoming posts I.e how to create and counter them. Following are some methods by which a Trojan vector is created
How To Create A Computer Virus For Windows
In this following tutorial I will demonstrate how you can create simple but effective viruses using batch scripts in windows. This is for educational purpose only. Batch scripts are nothing but commands that you type in windows command prompt. You can arrange single or multiple commands in specific order to harm system.
Convert IDM To Full Version From Trail Version
IDM (Internet Download Manager)is today known as world's best download manager but unfortunately it is available as paid version only. In this post today I ll show you how to convert a trail version of IDM into full version without any patch or cracker. First of all download IDM from http://www.internetdownloadmanager.com and install it on your PC.
Win An Anti-Virus
Hi there last day Devil's Blog On Security Completed 20,000 hits. So I thought I must take it to another level. So here's a deal I am placing a contest for all my readers to win a BitDefender Anti-Virus 2011 rated best Anti-Virus program for 2011 by http://www.toptenantivirus.net/ . Anti-Virus will be delivered at doorsteps
Virus And Worm
Welcome to Devil's Blog On Security. In this following post we will have a little look on what are virus and worm. As told earlier viruses are considered as very first form of computing threats its necessary for a hacker to know what is difference between a virus and worm and what are different
Anti Trojans List | Remove Trojans From Your PC
Anti-Trojans are software that are specially designed to help you detect and protect yourself from Trojans. They can also detect presence of virus and worms but are specially crafted to remove Trojans from your system. However no Trojan Remover is 100% effective. Therefore its good to regularly update your anti-Trojan software along with anti-virus and firewall
Netcat Tutorial | Using Netcat As Backdoor
Indications That Reflect You Are Infected By Trojan
Follows are some indications that are common symptoms of getting infected with Trojan horse.
Opening and closing of CD/DVD-ROM
Netcat Beginners Tutorial
Netcat is utility used to write data across TCP and UDP networks. Using netcat an attacker can place backdoor that will allow him/her to telnet DOS shell. In fact netcat can be used as port scanner, banner grabbing tool, Trojan and backdoor. The power of netcat can be calculated from the fact that it can act as both server and client and even doesn't get detected by Anti-Virus and even if it gets detected its source code is available add some unnecessary code that will change its signature thus allowing it by bypass Anti-Virus. This tutorial is aimed at complete beginner to netcat.