baddyna.blogg.se

How to create a software wrapper for trojan
How to create a software wrapper for trojan










how to create a software wrapper for trojan

We'll cover tools native to both Unix and Windows. Tools RequiredĪs with most types of engineering, you'll need some tools. Armed with this knowledge, even someone who is not an expert at assembly language programming should be able to look at the internals of a hostile program and determine what it is doing, at least on a surface level. This article is not intended to be an in-depth tutorial, but rather a description of the tools and steps involved. By "hostile code", we mean any process running on a system that is not authorized by the system administrator, such as Trojans, viruses, or spyware. This article outlines the process of reverse engineering hostile code. It also means information about what any particular custom Trojan does is also not generally available, so a custom analysis of the code is necessary to determine the extent of the threat and to pinpoint the origin of the attack if possible. Because of this, anti-virus software will not often detect their presence. Often these programs are custom compiled and not widely distributed. We refer to these programs as "Trojans" after the story of the ancient Greek Trojan horse. When they do, they usually leave programs on the system to maintain their control. Computer criminals are always ready and waiting to compromise a weakness in a system.












How to create a software wrapper for trojan