Home | About Us | Contact Us | Threats to your Security on the Internet | Products | Support | Online Store


RCT's & RAT's
What are they?
How do I detect them?
How many are there?
What ports do they use?

How do I Remove?
Acid Shivers
Acid Shivers (modified)
Back Orifice
Baron Knight
Big Gluck
Blade Runner
Bugs
Deep Back Orifice
Delta Source
Devil
Doly Trojan
Deep Throat
Deep Throat v2
Executer v1
Executer v2
Girlfriend
Hack 'a' Tack
Master's Paradise
NetBus
NetBus 2 Pro
NetSphere
Sockets 'de Troie
SubSeven (Sub7)
Whack-a-mole (NetBus)
WinCrash

Additional Resources
Latest News
Recommended Books
Recommended Links
Recommended Software


Deep Back Orifice

Deep Back Orifice currently affects Windows 95/98 PC's.

The "server" portion is typically named ".exe". It would be found in the WINDOWS directory and is relatively small (about 122kb).

Port 31338 (by default) is used to establish the connection between the "client" and "server".

Once installed, it is rerun every time the computer is started by means of an entry under the "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices" branch in the Registry.

Who is Responsible?

Deep Back Orifice was written by individuals calling themselves Hybrid, Maiden and Rael.

Here are some of the functions that Deep Back Orifice offers:

- Configuration only on one port
- The convenient interface
All functions BO, except for:
- resolve sharelist shareadd sharedel
- pluginexec pluginkill pluginlist
- regmakekey regdelkey regdelval reglistkeys reglistvals regsetval
- listcaps capframe capavi

Here's a picture of what the "client" portion of the software looks like.

Deep Back Orifice GUI screenshot

How to Remove Deep Back Orifice

Follow the removal instructions for Back Orifice.

While Commodon Communications does not participate in or condone the activities of hacking. We recognize the need to educate persons who express an interest so they can better identify the activities associated and to better protect themselves and/or their organization. If you're interested in purchasing software for the purpose of learning the subject of hacking and Internet Security click here to visit our online store.

 
    © Copyright Commodon Communications. All rights reserved.