Home | About Us | Contact Us | Threats to your Security on the Internet | Products | Support | Online Store |
|||||||
RCT's & RAT's What are they? How do I detect them? How many are there? What ports do they use? How do I Remove? Acid Shivers Acid Shivers (modified) Back Orifice Baron Knight Big Gluck Blade Runner Bugs Deep Back Orifice Delta Source Devil Doly Trojan Deep Throat Deep Throat v2 Executer v1 Executer v2 Girlfriend Hack 'a' Tack Master's Paradise NetBus NetBus 2 Pro NetSphere Sockets 'de Troie SubSeven (Sub7) Whack-a-mole (NetBus) WinCrash Additional Resources Latest News Recommended Books Recommended Links Recommended Software |
Deep Throat v2 currently affects Windows 95/98 PC's. It's rumored that the author is working on a Windows NT version. In this version of Deep Throat, the trojan deletes the existing "systray.exe" which is normally 36kb in size with the "server" portion, which is approximately 301kb in size. TCP port 6670, UDP Port 2140 and UDP port 3150 are used to establish its connection between the "client" and "server". Once installed, it is rerun every time the computer is started by means of an entry under the "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" branch in the Registry. Who is Responsible?Deep Throat was written by an individual known as ^Cold^ KiLler, CEO of DarkLIGHT Corp. His reasoning behind creating Deep Throat appears to be the same reasoning as others have offered. It was done for fun... Taken from it's readme.txt file, below are some of the functions that Deep Throat offers: To use the FTP server you will need a FTP Client Like Cute FTP or WS_FTP, This allows you to Upload and download files from the server (Any Client Should Work) Provided below, is a picture of what the "client" portion of the software looks like. It's what the remote user would use to control your system. What could be easier than "pointing and clicking" your way through another users PC? How to RemoveStep 1. Step 2. Step 3. Step 4. Step 5. Congratulations Deep Throat has been removed from your system. Important Notes:
|
||||||
©
Copyright Commodon Communications. All rights reserved. |