How to write a Trojan program that steals passwords. We create a Trojan to steal passwords. Instructions for creating a Trojan to steal passwords
Hacking How to create a Trojan virus. Pinch (for lamers)
The conflict arose when a Trojan prince kidnapped Queen Helen of Sparta and announced that he wanted to make her his wife. This naturally angered the Greeks, especially the king of Sparta. The Greeks besieged Troy for 10 years, but to no avail, because... Troy was well fortified.
In a last effort, the Greek army pretended to retreat and left behind a huge wooden horse. The Trojans saw the horse and, thinking that it was a gift from the Greeks, dragged the horse into the city, not realizing that the best Greek soldiers were sitting inside the empty wooden horse.
Under the cover of darkness, the soldiers got out, opened the gates of the city and later, together with the remaining army, killed the entire Trojan army.
Notes of a young admin
A couple of days ago, one of my friends left graffiti on my contact wall with a message that he hacked my account, etc. there was a link to the site vk-****.msk.ru. Well, yes. Of course.) I immediately wrote to him to get him treated and change his password. But the link still interested me, although I knew for sure that it was a Trojan (that’s what interested me). I decided to follow this link. As a result, I was offered to download a program that supposedly takes advantage of a recently discovered contact vulnerability and allows you to hack any account.
Instructions for creating a Trojan to steal passwords
A short guide to stealing money from online banking Hacking Territory: HackZona December 28, 2010 All about creating websites, blogs, forums, online stores, promoting them in Whether it is necessary to use some kind of Trojan for this, I don’t know. my home passwords are super complex, so I hope they can be cracked. originally from Ukraine (registration, reviews and opportunities of Likpay) Creating a Trojan to steal passwords! — YouTube November 1, 2012 if you don’t understand, write to Skype: comrad714 name of the program UFR stealer 3.0.1.0.
How to create a Trojan
Get ready, we have to write two programs at once. One will be on your machine (client), the other will need to be thrown to the victim (server). There will be a lot of work, so fewer words, and closer to the body.
So, launch Delphi or if you already have it running, then create a new project (“File” – “New Application”). Now we will get down to the server part of the Trojan.
Here you should move “From1” from the “Auto-Create forms” section (list on the left) to “Available forms” (list on the right), as I did.
How to create a Trojan
I think every reader knows the origin and meaning of the saying “Trojan horse”. The principle of operation of the Trojan virus is approximately the same (which is why it got its name). There are many types of this virus, today I will focus on one of the options for creating a Trojan program based on the developments of Alexey Demchenko or, as he is also called, “aka coban2k”, who is the author of a huge number of programs, including PINCH, which has become the most a common Trojan on the World Wide Web!
How to create a Trojan program.
We made Trojans and now we are also making a Trojan to steal passwords!
Here I will tell you how to make a simple Trojan to steal passwords from ICQ, Vkontakte, Odnoklassniki, Mail. etc. 3A%2F%2Fs61.ucoz.net%2Fsm%2F6%2Fsmile.gif&hash=1b9ff09e365c561776d64317149701b5″ /%
Now open the file “1.bat” with notepad. and change the words “Login” to your login from Yandex mail. and change the word “Password” to your Yandex mail password.
We wait. download complete.
We create a Trojan that steals all passwords from browsers (as promised)
So first we need to download the UFR stealer program, this can be done on the official website vazonez.com or via the link >> http://rghost.ru/55883641
Then we go to “build options” and click change icon so that our Trojan looks like a real program, or click merge files (it’s better for the victim to launch the program with which the trojan was glued together, and together with the program the Trojan itself)
Creating a Trojan to Steal Passwords
The virus's operating plan is as follows: it is launched, it scans all folders on the PC and copies the necessary files (by mask, for example, *.txt. pass*, etc.) to a flash drive.
Enables an extended command processing mode, i.e., it allows complex constructions such as two commands in one condition and others. Don’t laugh, because for Batch this is very cool.
Next, you need to remember the path to the directory from where the batch file was launched (we must copy the data to our flash drive, and not to some hard drive) because the code that comes next confuses the value of the CD variable (current working folder).
At the end of the Trojan's work, it will create a ready.txt file so that we know that it has finished working (we will make the Trojan invisible, without a console).
Trojan for stealing VKontakte password, download installer
In one column, a Trojan for stealing a password in Contact blocks the game on PS3. To steal the password, the Trojan takes into account the geographic coordinates of the owner to steal the recognized material. Taking into account user actions, the password Trojan allows you to personalize the display for communication in the system.
For communication, password trojans and automatic negotiation provide state-of-the-art creation tools.
Trojan for password theft
Just like office work, it provides easy navigation in the form of a virtual disk. Active Control announces the release of a product for working with bookmarks. Linear space defines their exact location to prevent acquisition.
Power Batch is looking for a help topic for limiting traffic. The rather large size at the bakery allows you to display reports. By holding down the keys to cool down, the password stealing Trojan, like individual editing, involves complete data transfer.
Trojans #9
Antivirus Stealer - unzip this program, copy 2 files and a folder to a flash drive (Antivirus.bat,autorun.inf,prog) and you can go with your friends with the flash drive! You insert the flash drive into the computer, click Antivirus.bat, when it stops you can close it and take out the flash drive, all the passwords that you have on your computer on the flash drive, they will be stored in the “prog” -> “log” folder.
Here I will tell you how to make a simple Trojan to steal passwords from ICQ, Vkontakte, Odnoklassniki, Mail... etc., etc....
Let's get started... first we need some programs:
Multi Password Recovery is a utility for recovering forgotten passwords
blat is an email client.
Bat to Exe converter - bat-exe format converter.
You can download all this in one archive:
You must be registered to see links.
Download and unpack into a separate folder...
Now open the file "1.bat" with notepad... and change the words "Login" to your login from Yandex mail... and change the word "Password" to your password from Yandex mail...
Save and close...
Now open "Bat_To_Exe_Converter"...
In the "Batch file" field, indicate the file you saved "1.bat"
The "Save as" field cannot be changed...
Set the settings as shown below:
Now let's go to the "Include" tab...
And transfer there all the files from the "blat" and "MPR..." folders.
There should be exactly seven of them!!! As shown above!!!
Well, now let’s add an icon to our Trojan... this is not necessary, but it looks more like some kind of program...
Go to the "Versioninformations" tab and in the "Icon fie" field select the icon....
Click "Compile"...
We are waiting... for the download to complete... and check the folder with the file "1.bat"... your Trojan "1.exe" should have appeared there (You can call it whatever you like
)...
Well, now let’s check... launch the Trojan on our computer and wait... in 30 seconds... a file will be sent to your email... download it (passwords are stored in it)
Downloaded... now we launch it through "MPR" and admire the passwords