Tools Description
of Trojans - Trojan Softwares
1.Beast
Beast is a Windows-based
backdoor trojan horse more commonly known in the underground cracker community
as a RAT (Remote Administration Tool). Beast was one of the first trojans to feature
a 'reverse connection' to its victims and once established, it gave the
attacker complete control over the infected computer.
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
2.Back Attack
Back Attack is a Windows
Based Trojan horse, which can also be called as Remote Administration Tool.
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
3.Back Orifice
BackOrifice Trojan when
installed on a Microsoft Windows system, this backdoor trojan horse program
allows others to gain full access to the system through a network connection
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
4.Donald Dick
Backdoor Donald Dick 1.52
is a Trojan that opens up a backdoor program that, once installed on a system,
permits unauthorized users to remotely extract passwords, edit the registry,
log keystrokes, etc. Donald Dick runs from the server file "c:\WINDOWS\SYSTEM\pnpmgr.pci"
over the ports 23476 and 23477 via TCP.
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
5.Girl Friend
The Girlfriend trojan
horse is one of many trojan horse programs that attackers can use to access your
computer system without your knowledge or consent.
6.Net Bus
The Netbus trojan is one
of the most famous trojans around. Its authored by Carl-Frederik Neikter that
is very similar to the "Back Orifice" trojan distributed by CdC. It
allows ANYONE running the client portion to connect and control ANYONE running
the server portion of it, with the same rights and privileges as the currently
logged on user.
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
7.Snow Door
Snow Door is a trojan program with help of this hacker
can gain access of Victim.
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------
8.Sub Seven
Sub7 or Subseven Gold (also known as Backdoor-G and
all of its variants) is the most well known Trojan backdoor application
available. You can download the setup-file of Sub7 from anywhere.
----------------WANT TO DOWNLOAD THIS TROJAN BE MY MEMBER----------------