How to Make Trojans among others-common trojans and scams

Source: Internet
Author: User

How to Make Trojans among others?

This is the most frequently asked question by netizens. There are also some scattered answers, but there are always few. So ainemo decided to collect the wisdom of everyone and write a topic about the next experience.Article. I hope you can speak more and improve this article to make some contributions to all Trojans. The objective is to protect personal PC security by allowing everyone to understand common trojans and scams.

1. bundling and spoofing. Bind the Trojan server and a game into a file and send it to someone else via QQ or email. After the server is running, you will see the gameProgramIf the trojan program is opened normally, it will not be noticed that the trojan program has been quietly running, which can be very confusing. In addition, even if someone reinstalls the system in the future, he may save the game you gave him.

2. This is a textbook-style old-fashioned deception. The method is as follows: Send the Trojan server directly to the other party and the other party runs without any response (a typical manifestation after the trojan is run). He said: "Why can't I open it!" You said, "Oh, no, the program is broken, right ?" Or, "Sorry, I sent an error !" Then, he sent the right things (normal games, photos, etc.) to him. After receiving the message, he was overjoyed and did not want to hear anything wrong with the thing just now.

3. QQ spoofing. Premise: you must first have a QQ number that does not belong to you. Then he used the number to send Trojans to his friends. Because he trusted the host of the stolen number, his friends would not hesitate to run the trojan program you sent to them.

4. Email spoofing. Similar to the third method, you can use an anonymous email tool to impersonate a friend or a large website or organization to send a trojan attachment to someone else. If someone else downloads and runs the attachment, the trojan will be launched.

5. Dangerous download points. This is a common method for vegetables mentioned by several friends later: (it is said that he has used this method to obtain thousands of bots) after breaking some download sites and downloading several software with a large volume of downloads, bind the trojan, and then quietly put it back for others to download. In this way, each time you increase the number of downloads, you will have an additional zombie. Or you can simply bind the Trojan horse to other software, and then publish the Trojan horse to major software download websites. They will not detect the virus, even if they cannot find the new Trojan horse I wrote, then... I don't need to say that there are at least two digits of meat opportunities.

6. Folder inertial click. After disguising a trojan file as a folder icon, put it in a folder, and set three or four empty folders on the outside. Many people attempt to pretend to be a folder Trojan due to continuous clicks, the trojan will run successfully.

7. Zip camouflage. This method is the latest. Bind a trojan together with a corrupted zip package (which can be made by yourself) and specify the bundled file as the zip icon, unless someone else looks at his suffix, it will be no different from the general damaged zip. I don't know that there are Trojans running quietly.

8. Upload the bundled Trojan horse in a briefcase or forum where attachments can be uploaded, and send the link to the victim.

9. webpage Trojans.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.