War Trojan details

  • Description

    1.0: From the doc: 'This is a very simple trojan to use and very easy to navigate. Anyway just send the 'server.exe' (rename it to something else- that you know the target would start),and when he run it an dialog will appear 'Corrupt Installation file' but in the case he installed a trojan without knowing it. The next step is to get his ip, if he uses icq just go get an ip sniffer (http://industries.progenic.com/icq.html) and then sniff his ip, put it in the ip box and connect to the remote host. It's not harder then that, when you are connected you can do some realy kool stuff'2.0: From the doc: ' just send the 'server.exe' (rename it to something else - that you know the target would start), and when he run it an dialog will appear 'Corrupt Installation file' but in the case he installed a trojan without knowing it.'.

  • Alias

    Backdoor.Wardoor.10

  • Exe

    client.exeserver.exe