This article helps you to better understand the Trojan virus.
What is a Trojan horse?
Trojan horse(simply known as Trojan) is a malicious code written by a security analyst used to hijack a Remote computer.
Requirement:
- A target Windows Machine
- Beast (Download the Tool from Here)
Access Windows XP with the Help of Beast
To access any machine you have to run the beast.
Click "Build Server". This helps you to build an executable file.
Basic:
- In this section, you have to set the name of the file name and a Listen Port.
- Click a connection:
- Direct Connection: A Direct Connection is usually used to get traffic directly from the client.
- Reverse connection: A reverse connection is usually used to bypass firewall restrictions on open ports. A firewall usually blocks incoming connections on open ports but does not block outgoing traffic.
- Notification: When the victim clicks and install then it \will notify from email or from Beast Application.
- AV-FW Kill: In this section, you can disable the victim's AntiVirus and FireWall.
- EXE icon: Here you can change the icon image.
- Save Server: To save the exe file.
Send the file to Victim. When the victim clicks on this file you get notified.
Why i cant download it
ReplyDelete