Thursday, March 8, 2012

How to Make your own TROJAN VIRUS | By Neoteric

I guess everyone of you have once in your computer-life experienced a threat to your system called Virus. Now today we will see how a virus is made and which is the most highly and widely used by script kiddies. Before I start the recipe, we need to talk about few types of TROJAN VIRUS attacks; 
well for those who do not know about TROJAN virus (please click to know what Trojan virus is)  TROJAN VIRUS. First let us talk about the types of Trojan Attacks:
  1. Password Capturing and Sending,
  2. FTP (port:21) Trojan
  3. DOS Trojan (misuse of one's bandwidth)
  4. Remote Acces
  5. Software killer
Above we talked how do Trojans affect you. now we have; where do Trojan/Viruses come from,

  1. Online Chat/Group Chat (Yahoo,Gmail,IRC)
  2. Attached File in email
  3. Physical Access to a System
  4.  Free Websites material/software
  5. Wrappers
  6. File Sharing
Softwares which create are (ones which still function):
  1. NetBus
  2. Beast Final
The Software which I will Demonstrate in front of you is BEAST TROJAN HORSE, (ps: it is difficult to find these days but it's still very effective).
This is how the Software looks when you open it,

Because this software is very controversial, I would not be able to show all the images with respect to the Trojan Building Software.

  1. Now what do hackers do is that they run this software (very small software), They first need the ip address of the victim they need to attack. Lets say they got your ip they will enter it into the blue box just below HOST. (The address given is the default address common to all offline computers)
  2. Next is they require the port through which they need to attack, most of the script kiddies leave it default 6666 or 9999. But if hackers know what they are doing so they try to inject and communicate through the port they think will be vulnerable.
  3. next they click on build server and the window below will open, Most of the script kiddies do not mess with much of the settings,
 if it is required to make the virus a little less detectable they change the name to something the user will not be able to recognize, such as the name given above.
     4.  Now before completion to make virus further undetectable they need  go to EXE icon and choose a different icon then application, to just click on BUILD SERVER, an waalaah their virus TROJAN is created.
     5. Now when they again look into the folder where beast is stored they find a file named as SERVER.EXE.(33kb to 66kb) this is the TROJAN virus.
      6. Now the only thing left is to plant this virus into the system of the victim by any of the other means above. and the Victim is hacked. 
When we go up and look at the first picture will will find a few options on the right hand side of the screen, using those options one can do following actions;
  1. Access ALL DRIVES of the victim and use it for exploitation or criminal activity,
  2. Use the person's WebCam
  3. Can ADD, Plant or even DELETE user softwares and DATA
  4. There are fun tricks also such as open CD drive, Lock Mouse, Lock Screen, Send Chat MEssages to the Victim
  5. Prompt Error Messages to the Victim etc., and many more activities which will surely make the user go pale.
This is a way the Hackers/Script kiddies create their own viruses and  Trojans. So Beware and Be-safe.
PS: All the information provided above is for educational purpose, please don't try this for any criminal activity because if caught can even go to jail .

MANY of you might think that you are not stupid enough to click on a very small file as above, but guess if a picture or a software or a video or document imagine any file is INFECTED then what do you do...???
In the NEXT POST we will talk about how to make IMAGE, SOFTWARE, DOCUMENT, VIDEO, etc a INFECTED VIRUS.


  1. i am trying to download beast but the files i found are malicious, do you have any other verified site for it.

  2. I wanna b a hacker and that a gud example and explanatory thanx for ur knowledge

  3. Can you please reply ? I have some question

  4. Hi Piyush, that’s an astounding piece of work. I am sure it is going to help many who aspire to be an ethical hacker. However, people looking forward to get acquainted with virus removal techniques can refer to our website for detailed instructions.