Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Mabinogi
You last visited: Today at 13:45

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



New Player Warning Guide to Trojans.

Discussion on New Player Warning Guide to Trojans. within the Mabinogi forum part of the MMORPGs category.

Reply
 
Old   #1
 
elite*gold: 0
Join Date: Sep 2007
Posts: 251
Received Thanks: 100
New Player Warning Guide to Trojans.

Ok guys, this is a guide on what to look out for on trojans this is not ment to teach how to make trojans or how to trick people or even make them undetectable this is here to help the people who do not know much on how these work or think they are limited to .exe files.

Disclaimer: I will not be held responsable with what you guys do with this information or attachments it is here to teach you guys what to look out and what they are. Everyone before you jump the gun and freak out please read the Topic FULLY I know it is hard but it is ment to help you guys. If this helps you in any way please thank me.

1. Ok First a Batch File, and most people think hmm Why would you wana make a trojan in a batch file if you can just read it in notepad. Well you can't you can try to read this one if you know what you are doing. It will be the first to be uploaded.

2. Ok another method is .scr files aka Screen Savers, Say one day someone happend to say I made a 2moons Screen Saver, Maybe they did Maybe they made a Screen Savor and Added a Trojan to it or Maybe it is pure trojan you never know be careful. I will upload an example (It dose not have any Screen Saver Effects just the file type).

3. Shortcuts or .pif Files. I decided to save time and put 2 in one It is a Shortcut and a .pif file in one. Think of it this way say someone makes a bypass and uses a batch file or exe. You scan the file it finds nothing but the .exe or batch file has fragments into it so after you install it, then it will create a shortcut onto the desktop which will be of all of the compiled data. Almost 100% Undetectable.

4. Windows NT Command Script or .cmd is the extension. It wont be used much due to the fact not many people know what this is but it can be used to confuse people but looks very Suppicious. But keep an eye out.

5. Lastly .com files little know think of them as Early day exe files They just use pure code and run on low memory be careful they are still an exe file.

Last Notes, trojans arent limited to this they can be in anything from Mp3 Mp4 JPEG JPG and many many many formats so no file is save bellow is more information on each file exstention (the boring part).

----------------------------------------------------------------------
1A. In MS-DOS, OS/2, and Windows, a batch file is a text file containing a series of commands intended to be executed by the command interpreter. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. A batch file is analogous to a shell script in Unix-like operating systems.

Batch files are useful for running a sequence of executables automatically. Many system administrators use them to automate tedious processes. Although batch files support elementary program flow commands such as if and goto, they are not well-suited for general-purpose programming.

DOS batch files have the filename extension .BAT. Batch files for other environments may have different extensions, e.g. .CMD in Windows NT and OS/2, or .BTM in 4DOS and related shells.

2A. .scr, a file extension used for MS Windows screensavers
.scr, a file extension used for ZX Spectrum screens (256x192) on MS-DOS systems and emulators

3A. PIFs, or Program Information Files, define how a given MS-DOS program should be run in a multi-tasking environment, notably to avoid giving it unnecessary resources which could remain available to other programs. TopView was the originator of PIFs which were inherited and extended by DESQview and Microsoft Windows, where they are most often seen.

3B. Within Windows, a PIF holds information about how Windows should run the application the PIF corresponds to. The instructions can include the amount of memory to use, the path to the executable file, and what type of window to use (Full screen, window, size in pixels)

3C.* Creating a program information file for an MS-DOS-based program creates a shortcut to the program executable. All the settings saved in the PIF are contained in the shortcut.
* Although an actual PIF does not contain any executable code (it lacks executable files magic number "MZ"), it is an ipso facto, and it can be used to transmit computer viruses because of the way Microsoft Windows handles files with (pseudo-)executables' extensions: all .COMs, .EXEs, and .PIFs are analysed by the ShellExecute function and will run accordingly to their content and not extension. This can be proved by renaming any file from one of the extensions above to another.
* A common e-mail spam attachment

4A. In CP/M-86, CMD is the filename extension used by executable programs. It corresponds to COM in CP/M-80 and EXE in MS-DOS


5A.The file name extension .com has been used in various computer systems for different purposes. Originally, the term stood for "Command file" and was a text file containing commands to be issued to the operating system. This was the practice on many of the Digital Equipment Corporation mini and mainframe computer systems going back to the 1970s.[1]

With the introduction of microcomputers this use of files ending with the extension .com changed. In MS-DOS and compatible DOSes, and in 8-bit CP/M, a COM file is a simple type of executable file. The name of the file format is derived from the file name extension .com (not to be confused with the .com top-level domain), which was originally the extension used for such files. However there is no actual association between the file format and the file name extension in any but CP/M and very early versions of MS-DOS.

5B.The format is still executable on many modern Windows-based platforms, but it is run in an MS-DOS-emulating subsystem which was removed from the x64 variants.

COM files can also be executed on DOS emulators such as DOSBox, on any platform supported by these emulators. "COM" is short for "core image" and is also interpreted as "command" as these .com files contained the code for the basic commands that could be run on the machine.

Many shell utilities such as the MS-DOS version of more used this format, as well as small, early applications.

5C. The COM format is perhaps the simplest executable format of all; it contains no metadata, only code and data, and is loaded at offset 0x0100 of some segment and executed. Because of how the segmentation model works, there is no need for relocation.

Its simplicity exacts a price, however: the binary has a maximum size of 65,280 (0xFF00) bytes and stores all its code and data in one segment. This was not an issue on early 8-bit machines, but it is the main reason why the format fell into disuse soon after the introduction of 16- and then 32-bit processors with their much larger, segmented memories.

---------------------------------------------------------------------
theonlylok1 is offline  
Old 07/08/2010, 05:24   #2
 
pawntobishop's Avatar
 
elite*gold: 0
Join Date: Sep 2009
Posts: 1,317
Received Thanks: 472
Found this thread while doing a bit of cleaning, it seems relevant and will become even more relevant with all of the releases (At least I'm hoping we will get more releases) that are going to be put up on this site.
Does anyone object/agree?
pawntobishop is offline  
Old 07/08/2010, 05:49   #3
 
Alwaho's Avatar
 
elite*gold: 0
Join Date: Oct 2009
Posts: 929
Received Thanks: 290
I agree, im turning the tarlach server upside down right now, no one mods in it... so its time i get started modding in it and bring up the server's reputation. Also this thread is very helpful, nice find man.
Alwaho is offline  
Old 07/08/2010, 16:37   #4
 
elite*gold: 0
Join Date: Oct 2009
Posts: 35
Received Thanks: 0
watchu talkin bout people in tarlach mod too we just use more low profile stuff so it seems like its all sunshine and rainbows
Gendraco is offline  
Old 07/08/2010, 17:57   #5
 
Alwaho's Avatar
 
elite*gold: 0
Join Date: Oct 2009
Posts: 929
Received Thanks: 290
Quote:
Originally Posted by Gendraco View Post
watchu talkin bout people in tarlach mod too we just use more low profile stuff so it seems like its all sunshine and rainbows
lol... well, tarlach people (as far as i know) Just take people's mods for granted. Some people who are not lazy (like me) Like to take pride in the work they do. Tarlach is basicly a server full of leachers who take credit. I HAVE been to Nekojima before in tarlach... I never leached it tho. I took credit for what i did.. and suprisingly, there was no Gm's on the island xD. but now its patched . But you see? lol... If i would have released a wing, things would be out of hand AND people would say. I went to nekojima first, i came out with it!! Thats how people of tarlach are!
Alwaho is offline  
Old 07/08/2010, 23:49   #6
 
elite*gold: 0
Join Date: Oct 2009
Posts: 498
Received Thanks: 110
You're not too smart, are you?

You basically described ruairi, tarlach is nothing like that.
Halfslashed is offline  
Old 07/09/2010, 01:55   #7
 
Alwaho's Avatar
 
elite*gold: 0
Join Date: Oct 2009
Posts: 929
Received Thanks: 290
never been to ruairi xD, and no im only 12 x.x



Or am i?
Alwaho is offline  
Old 08/13/2010, 00:49   #8
 
elite*gold: 0
Join Date: Oct 2009
Posts: 109
Received Thanks: 14
That does not help your creditability at ALL.
Internetz is offline  
Reply


Similar Threads Similar Threads
Vsro Call to advertise a new player + New Register Guide
02/19/2010 - Silkroad Online - 29 Replies
Hello you guys i wanna call new players for vsro Server Thien Binh :D Search some Active players ( ONLY English Speakers ) You get farmed at ongs from lvl 92 nuker !!!! when you have enough Sp you get lvl up at penons from lvl 88 Rouge we give you some money as "Startmoney" Later we go trade and so you will get enough money to buy what you need ;)
[Guide] Becoming a Player Moderator(P Mod) [CHEATING!]
06/30/2008 - Runescape - 3 Replies
-------------------------------------------------- ------------------------------------------- Note: There are two versions of this guide. One of them is cheating and one is not. ------------------------------------------------- --------------------------------------------- Becoming a Player Moderator(Cheating) Time: About 40 minutes What you need: 1 Player that has never been reported (The Player Moderator) 1 Friend (Or extra computer)
Warning Trojans/Undetected
10/21/2007 - Dekaron - 2 Replies
Ok Guys due to the fact I cant upload files myself *Privlages Removed I came to show you how easy it is. I did this in 5 minutes. File 1 Trojan EXTREAMLY Detectable. Antivir: TR/Dldr.VB.zf ArcaVir: Trojan.Downloader.Vb.Zf Avast: Win32:VB-NZ AVG: Downloader.Generic.VNO BitDefender: Trojan.Agent.VB.ANQ ClamAV: Trojan.Downloader.VB-76



All times are GMT +1. The time now is 13:45.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.