Trojan

Dan -  
marguerite Messages postés 228 Statut Membre -
Bonjour à tous,
Un lecteur peut-il me donner des renseignement sur Trojan.Psyber.Sheam Server Voice et Trojan.Voodoo.Doll. J'ai trouvé ces noms à plusieurs places sans savoir quel est leur action.
Merci
Dan
A voir également:

2 réponses

angej Messages postés 2555 Statut Contributeur 301
 
je voudrais pas etre desagreable mais fait comme moi ,
CHERCHE !!! (pour moi c'est backdoor subseven 22.a)
j'ai presque tout trouvé sur : www.google
ange
0
Dan
 
Réponse à Ange,
Si je pose quelques questions sur plusieurs forum, c'est que je CHERCHE, sinon je ne prendrais même pas la peine de poser la question.
Merci quand même pour la réponse
0
marguerite Messages postés 228 Statut Membre 25
 
Voila un extrait de ce que j'ai trouvé avec google. tu trouveras plein de sites (en anglais!) qui parlent de ça.
Marguerite

Name: VooDoo Doll
Aliases: N/A
Ports: 1245 (port can be changed)
Files: Voodoo.zip - Voodoodoll.zip - 652,565 bytes Voodoo06.exe - 274,432 bytes Adm.exe - 36,864 bytes Asycfilt.dll - 147,728 bytes Comcat.dll - 22,288 bytes Mswinsck.ocx - 108,336 bytes Oleaut32.dll - 598,288 bytes Olepro32.dll - 164,112 bytes Vb6stkit.dll - 102,912 bytes
Created: Nov 1998
Requires: Mswinsck.ocx, Oleaut32.dll, Olepro32.dll and Vb6stkit.dll - are required to run the trojan.
Actions: Remote Access
Versions: 6.0,
Registers: Does not register.
Notes: Works on Windows 95 and 98.
Country: N/A
Program: Written in Visual Basic 6.

--------------------------------------------------------------------------------

Using Port Scanner (Trojan port set) from AATools, you may check the remote PC in a LAN or via Internet. Using Network Statusfrom AATools, you may see what ports are in use on your local PC for connection with remote systems (LAN/Internet). If you register port probes directed against ports that are normally not used, it is possible that someone is trying to connect to a Trojan inside your network. If you find that a Trojan is being accessed on your network, use antiviral program to check your system in detail.

NOTE: Ports of low range are often used by Trojans to steal your passwords and send them to an attackers via e-mail, or to hide them deeply in FTP servers. Ports of higher range are using to unauthorized access to your PC.

If you have any questions or information about ports used by Trojans not listed above, please contact us at report@glocksoft.com

--------------------------------------------------------------------------------

Questions or problems regarding this web site should be mailed to webmaster@glocksoft.com
Copyright © 1999-2000 G-Lock Software. All product and company names are trademarks or registered trademarks of their respective owners.
All rights reserved. Privacy statement.
0