A Trojan or software that could hack back the attacker

Discussion in 'Ethical hacking' started by raghav, Oct 29, 2009.

  1. raghav

    raghav New Member

    Joined:
    Jun 25, 2007
    Messages:
    23
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    None
    Location:
    Australia, NSW, North Rocks, 2151
    Hey, people i just had a question in mind...

    sometimes i get some problems on my pc and want to know if there is an attacker who is remotely controlling or hacking my computer, even with using my anti virus or a firewall,
    is it possable for a software or a trojan or something similer, to have the ability, to let me iether scan my computer, or give me access directly back to the attackers computer, without them knowing of it, - also something like that, when accomplished, gives me the user name (IF THEY HAVE ONE), AND the password of the attacker, and gives me a complete opposite interface of the attckers computer, and lets me do whatever i want-
    or something for revenge.

    Please help......This has been happening to me for almost 4 years now.

    Thanks.
    raghav.
     
  2. indiansword

    indiansword Security Expert

    Joined:
    Oct 19, 2008
    Messages:
    491
    Likes Received:
    37
    Trophy Points:
    0
    Occupation:
    Operation Planner for 3 Australia
    Home Page:
    http://www.Secworm.net
  3. Hex00010

    Hex00010 New Member

    Joined:
    Jul 21, 2009
    Messages:
    31
    Likes Received:
    0
    Trophy Points:
    0
    Easier way but its called Fast Track by Backtrack learn use use it love it
     
  4. $nip3r

    $nip3r New Member

    Joined:
    Feb 17, 2009
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    try reverse engineering
     
  5. SpOonWiZaRd

    SpOonWiZaRd Know what you can do.

    Joined:
    May 30, 2007
    Messages:
    746
    Likes Received:
    8
    Trophy Points:
    0
    Occupation:
    Network Engineer/Programmer
    Location:
    South Africa
    For him to hack you, he must be able to get through your gateway, so check your gateway if you feel there is any suspicious activity on your network from outside.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice