View Full Version : personal trojan?
BuzzKillington
06-15-2010, 06:45 PM
I came across a program (http://preyproject.com/) where you can install a bunch of odds and ends yada yada yada and you could view through the webcam who stole your laptop.
My question is, is there an easier way I can do this with my own trojan virus that I could install on my own computer that I could somehow activate to start e-mailing me videos or pictures?
My buddies netbook just got stolen from school and since I plan to also be bringing a netbook to class I wouldn't mind the added security.
Luke122
06-15-2010, 07:21 PM
This is pretty personal....
http://www.marketingmisses.com/images_user/lib/200905/trojan.jpg
Oneslowz28
06-15-2010, 07:48 PM
Couldn't you set up a remote connection program to run on start up and then you can log in if it gets stolen and activate the cam?
Oh and Luke.. That aint no Trojan..
THIS IS A TROJAN
http://www.rubbersbymail.com/images/condoms/Trojan_Magnum_XL_LRG.jpg
Drum Thumper
06-15-2010, 08:44 PM
+1 to Oneslow's post. Specifically, Logmein.
And you both fail, btw.
THIS, MY FRIENDS, IS A TROJAN
http://thebestcasescenario.com/drumthumper/HolyGrail066.jpg
Oneslowz28
06-15-2010, 08:52 PM
@Joe
http://www.frugaldreamer.com/wp-content/uploads/2009/12/Failboat.jpg
BuzzKillington
06-15-2010, 10:10 PM
A remote program would work too as long as it was stealth so it doesn't get deleted. I suppose it could be set under exceptions though.
Hmmm, this reminds me of that lawsuit recently against the high school that (allegedly) was using similar software to spy on students in their homes...
Depending on home in depth you want to go, there are several different routes. On the on end, logmein would probably be the easiest, but would alert the thief to the fact that you were connecting to it. On the complete opposite end, you could write/adapt a custom rootkit (http://en.wikipedia.org/wiki/Rootkit) with a RAT (http://en.wikipedia.org/wiki/Remote_Administration_Tool) (let me know if you want to do this, I can get you some resources to point you in the right direction). Then, falling somewhere in the middle would be one of a few ready made tools (I don't know any off hand, but I know they exist).
BuzzKillington
06-15-2010, 11:44 PM
Rat route sounds good to me. :)
dr.walrus
06-15-2010, 11:56 PM
Dude who you tryin' to monitor? You're selling this too:
http://www.thebestcasescenario.com/forum/showthread.php?t=23338
Suspicious! Hehe
Drum Thumper
06-16-2010, 03:26 AM
Hmmm, this reminds me of that lawsuit recently against the high school that (allegedly) was using similar software to spy on students in their homes...
Depending on home in depth you want to go, there are several different routes. On the on end, logmein would probably be the easiest, but would alert the thief to the fact that you were connecting to it. On the complete opposite end, you could write/adapt a custom rootkit (http://en.wikipedia.org/wiki/Rootkit) with a RAT (http://en.wikipedia.org/wiki/Remote_Administration_Tool) (let me know if you want to do this, I can get you some resources to point you in the right direction). Then, falling somewhere in the middle would be one of a few ready made tools (I don't know any off hand, but I know they exist).
Fair enough. Although, if you were really good, you could social engineer the crooks into accepting a remote login via the Windows remote login feature.
Mitnik could pull it off no sweat.
BuzzKillington
06-16-2010, 03:43 AM
Dude who you tryin' to monitor? You're selling this too:
http://www.thebestcasescenario.com/forum/showthread.php?t=23338
Suspicious! Hehe
LOL!
Powered by vBulletin® Version 4.2.1 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.