For remote access of the target computer, an attacker should first install a trojan on the victim's computer. An attacker cannot send the trojan to the victim's computer directly because the victim can recognize that the received file is a trojan. So instead of directly sending the trojan to the victim's computer, the attacker binds the trojan to any of the executable files like calculator.exe or any flash games etc and sends to the victims computer. When the victim receives the executable file he thinks that that is a normal executable file and executes it.
Then along with the executable file, the trojan is installed too. Then the work is done. Now the attacker has a complete access over the victim's computer.
There are several EXE binder tools present to bind the trojan to any of the executable files.
one of the famous exe binder tools are
Inpect tool (download here)
The inpect tool works like this.
we should enter the the executable file in the first text field and trojan file in the second text field and click inpect thats it........!!!
Inpect tool looks like following
0 comments:
Post a Comment