MegaSecurity.org
Home Related Translate Site Search

Trojan Papers

MASTER PASSWORD Optix Pro v1.0 -> 1.2

The Complete Windows Trojans Paper by Dancho Danchev.

Auto Start Methods by Da_Doc.

Trojans capable of killing Firewalls and Anti Virus Programs

Extension Identification Bug and IE Registry Manipulation by Da_Doc.

Activex startup method used in subseven 2.2 by HeAdpUtTy.

Detecting and Containing IRC-Controlled Trojans by Corey Merchant and Joe Stewart.

Tested Trojans.

Remote Control Trojan Horse Software. (link). James Madison University.

Where There's Smoke, There's Mirrors: The Truth about Trojan Horses on the Internet. (link) . IBM TJ Watson Research Center.

Testing Times for Trojans. IBM TJ Watson Research Center.

Dark-e. (link). Description and Removal.

Trojan Horse Attacks. (link) by Joseph Lo, Ph.D. aka Jolo.

Trojan Horse Port List (Default Ports). (link) by Ofir Arkin

By Simovits Consulting:
Trojan list sorted on action

Trojan list sorted on trojan file sizes

Trojan list sorted on trojan file name

Trojan list sorted on trojan files

Trojan list sorted on target environment

Trojan list sorted on origin country

Trojan list sorted on programming language

---------------------------------------------------------------------------------------------------------------
AcidKor
Acid Shiver
ACK Tunneling Trojans
Active X
AIDS-Cyborg Trojan
AIDS Info.doc
Analysis of Subseven Trojan. Distributed Attack Feature
AOL4Free Trojan
AOL Admin 1.1 (doc)
AOL Gold
APS Trojan.pz
Ashley
Atlantis 1.2 Trojan
BO Sniffer
Back Orifice 2000
BO2K Turorial.
Back Orifice 2000 - Summary.
Backorifice, Information by Microsoft
Barok 2.1
Beast 1.91 (pdf)
Bionet 3.13
Cafeini 0.9
Caligula
Creating and Preventing Backdoors in UNIX Systems
Ch3 backdoor linux
Cyborg or AIDS trojan
DATASPY NETWORK X BETA 0.5
Data Rape 2.1
Death 1.0
Der Spaeher
Desktop Puzzle
D.I.R.T (pdf)
Drat Trojan
Drat 3.0
Evil HTML
Funny Trojan
Glacier Backdoor
Girlfriend 1.35
Host Control 1.0
ICKill Trojan Analysis. By: The Messiah
Trojaned version of the portmap.
Kill MBR.
K2PS password sender
Magic Horse Trojan
Mosaic 2.0
Netbus no longer a Trojan horse?
Net Controller 1.08 (rtf)
Noob 3.0
Noob 3.01
Noknok 8.2
PC Invader 0.5
Peanut Brittle
PE Trojan
Portal of Doom
ProjectNEXT 0.5.3 beta.
ProMail 1.21 Trojan
Psyber Streaming Audio Server 1.0
QAZ analysis by Diamond Computer Systems
QAZ Trojan
SANS about QAZ
Script Attempts to Exploit Microsoft Backdoor.
Skydance 2.16 beta
Skydance 3.03
South Park
Spying King (HLP file)
Steroid Trojan
SubSeven Commands
SubSeven 2.2 Editor Information
SubSeven Defcon 2.1, IIS Security Alert
SubSeven, version 2.2, IIS Security Alert
SubSeven Secrets by Wajid
Subseven 1.0
Subseven 1.1
Subseven 1.2
Subseven 1.3
Subseven 1.4
Subseven 1.5
Subseven 1.6
Subseven 1.7
Subseven 2.1 Raw Commands
Subseven 2.1 Bot Help
Subseven 2.2
Sysman.exe
Trojan Information. This paper aims to investigate the Trojan phenomenon. PDF file
The Twelve Tricks Trojan
Troj_Platan
Troj Splitters
Troj_Wincrash.B
Finding and analyzing trojans under unix
Trojan NarNar
TFN analysis
Trin00 analysis
Trin00 for Windows
URL Snoop
Virus, worm, trojan Information
Vmscrtl.exe Trojan Horse
Voice Spy 1.0
VSB_PICA.A
WC RAT 1.2b
Whack Job 1.7
WinControl 1.33
WinCrash.doc-Information
WinNT.Infis trojan
WinPC
WinSatan
Y2KCount