-
January 2nd, 2006, 05:46 PM
#1
Junior Member
Genie - Backdoor
First of all i want to wish happy new year
and may the new year brings happiness, joy and healthiness to everyone!
Now...
I wrote lately a program and i decide to release it....
Is a telnet backdoor program and i name it " Genie "
For more info read the "readme" in to zip.
If someone interest then they could find it to http://users.otenet.gr/~unimex/
-
January 2nd, 2006, 07:20 PM
#2
Of course this program is untraceable from any antivirus .......except firewalls.
Should propably be not yet traceable by antivirus..
I havn't taken the time to look at it indepth..
Just the basic stuff..
So, I can't ask any tech stuff yet..
But who is this 'Katerina Tsanidou' chick you dedicate all your software to ??
ASCII stupid question, get a stupid ANSI.
When in Russia, pet a PETSCII.
Get your ass over to SLAYRadio the best station for C64 Remixes !
-
January 2nd, 2006, 07:39 PM
#3
Junior Member
Originally posted here by the_JinX
Should propably be not yet traceable by antivirus..
I havn't taken the time to look at it indepth..
Just the basic stuff..
So, I can't ask any tech stuff yet..
But who is this 'Katerina Tsanidou' chick you dedicate all your software to ??
---------------------
You hear the expression "The Curiosity Kill the Cat" ??
-
January 2nd, 2006, 07:43 PM
#4
Does this "program" have any legitimate usage? It seems to just be a trojan that you have written. In the readme you even refer to it as a virus. Correct me if I am wrong, but I was of the belief that we were working against things like this that could make our systems less secure. This doesn't seem to do that.
If there is a legitimate useage for this then can you enlighten me?
If everything looks perfect, then there is something you don\'t know
-
January 2nd, 2006, 08:14 PM
#5
Originally posted here by qwertyman66
Does this "program" have any legitimate usage? It seems to just be a trojan that you have written. In the readme you even refer to it as a virus. Correct me if I am wrong, but I was of the belief that we were working against things like this that could make our systems less secure. This doesn't seem to do that.
If there is a legitimate useage for this then can you enlighten me?
Hey Hey,
Do you only want one legitimate use? Testing your IDS to see if it'll catch two-way communication by means of a trojan on an obscure port. To test any real-time defense software you have to see if it detects the opening of a port that's not needed?? How's that..
Remember the old slogan?
"Hackers Know the Weaknesses In Your System, Shouldn't You?"
This can point out weaknesses in your system....
However, I would say that it would be more fitting if it was released with the source code... That woud allow analysis of the code, tweaking of the code and be more conducive to learning
Peace,
HT
-
January 2nd, 2006, 08:24 PM
#6
Good reason HT, I hadn't thought about that. Possibly I would have objected less to it if the source had been included with it.
prncipia, apologies for the strong reaction. It's been a bad day.
If everything looks perfect, then there is something you don\'t know
-
January 3rd, 2006, 01:08 AM
#7
prncipia av mfgrs have people watching the boards. a day or two at most and it'll be detected
Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”
-
January 3rd, 2006, 04:07 AM
#8
prncipia av mfgrs have people watching the boards. a day or two at most and it'll be detected
tedob1 you are IMO one cool as mother ****er on this board. I personally like your style / reply.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|