|
||||||||||||||||||
![]() ![]() ![]() |
DonaldD.Trojan
|
DonaldD.Trojan is something similar to BackOrifice.Trojan. When installed on a Microsoft Windows system, this backdoor trojan horse program allows others to gain full access to the system through a network connection. It consists of two pieces: a server and a client application. Both applications are capable of running under Windows 95, 98, and NT 4.0. The port number through which the client controls the server is configurable. However, as long as the port is blocked by a firewall, this trojan horse will not be able to infiltrate the server. It does not matter whether the TCP or SPX protocol is implemented. There have not been any reports of this program being able to break through a firewall. Server application may be configured with different options. The networking protocol may be TCP or SPX. Any port number between 1 and 65535 may be selected for communication. The default port number for TCP is 23476, and an additional default port is 23477. For SPX, it is 0x9014 and an additional default port is 0x9015. A password may be specified to limit the access on a server. However, there is a bug with version 1.52 of the trojan. In the client GUI, the password typed in is initially hashed using MD5 and is converted to a 32-byte string which is the hex representation. Then the result is sent to the server. For the command-line version of the client, the password is sent without using any type of encryption. Thus, if a user sets the password of the server using the command-line client, he cannot re-access it by using the GUI client with the same password. Here are some of the bugs found in version 1.52 of this trojan. When the client attempts to play a WAV file to the server, and the client does not specify a filename in this field, the client program will crash. The same situation occurs when the client user forgets to specify the pathname for the server upgrade command. Commands the program may send to the server program: Create and delete directories
TIPS
HKEY_LOCAL_MACHINE\System\ Delete the folder named VMLDR. Go to the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\ On the right-side of the window, look for
the registry with BootExecute inside its Name field. Right-click on BootExecute,
select Modify. Here, you will see some hexadecimal numbers and some
ASCII text beside them. Look for bootexec.
Windows 9x Systems without an antivirus product Installed If you do not have an antivirus product
that detects this trojan, you must do the following.
Remove the floppy disk and restart the
system.
HKEY_LOCAL_MACHINE\System\ Delete the folder named VMLDR. Restart the machine again, look at the registry, and make sure that the trojan did not re-install itself. |
||||||||
|
|
|||||||||
| [an error occurred while processing this directive] |
|
Howdy!!! Welcome to the McCann's PooR Farm I'm not with any school or schools, Just a disable grandpa with 17 grand kids, 1 Great grand Kid Sorry! about all of the adds, Our Cost just keeping going up. Please click on one of them and help us out. or Send $1.00 U.S. to: McCann's Poor Farm 20509 Lawrence 2207 Aurora, Mo. 65605-7275 Thank You, Junior McCann Webmaster and the GrandKids See what the experts have to say about the McCann's Poor Farm Web Page Legal Disclaimer - We Are in no way connected with any School and or Companies linked to this page. Links are provided as a courtesy only. |
Argentina, Australia, Austria, Belarus, Belgium, Bermuda, Brazil, Brunei Darussalam, Bulgaria, Canada, Chile, Columbia, Costa Rica, Croatia, Croatia/Hrvatska, Czech Republic, Denmark, Dominican Republic, Ecuador, Egypt, Estonia, Finland, France, Germany, Ghana, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan, Jordan, Korea, Korea, Republic of, Latvia, Lebanon, Lithuania, Luxembourg, Macedonia, Malaysia, Mexico, Moldova, Netherlands, New Calendonia, New Zealand, Norway, Old style Arpanet, Papua New Guinea, Peru, Philippines, Poland, Portugal, Romania, Russian Federation, Saudi Arabia, Singapore, Slovakia, Slovenia, South Africa, South Korea, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, USA Government, USA Military, Viet Nam |
|
Tell A Friend about this Page |
Tell me when this page is updated |
|
|
Put a Link on your Web Page
- Legal Disclaimer - |