29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hacking For Beginners – Manthan Desai 2010<br />

1. Server component of the Trojan opens a port in the Victim’s computer and invites the Attacker to connect and<br />

administrate the computer.<br />

2. Client component of the Trojan tries to connect the Victim’s computer and administrate the computer without the<br />

permission of the User.<br />

Wrapper<br />

A Wrapper is a program used to combine two or more executables into a single packaged program. The wrapper attaches<br />

a harmless executable, like a game, to a Trojan’s payload, the executable code that does the real damage, so that it<br />

appears to be a harmless file.<br />

Hackers use Wrappers to bind the Server part of the Software behind any image or any other file. Wrappers are also<br />

known as Binders.<br />

Generally, games or other animated installations are used as wrappers because they entertain the user while the Trojan in<br />

being installed. This way, the user doesn’t notice the slower processing that occurs while the Trojan is being installed on<br />

the system—the user only sees the legitimate application being installed.<br />

w w w . h a c k i n g t e c h . c o . t v Page 46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!