Tuesday, 31 July 2018

Binder : Hacking software to hide Trojans and Viruses

In my previous articles, I explained about RATs and then Crypters to evade or bypass antivirus detection. Also, alongwith crypter, it is beneficial to hide RATs , trojan and virus using Binder – software used to bind trojans with say images or any file, you desire. So, I am explaining you about Binder, in this article.

What is Binder???

Binder is a software used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application (in our case – RAT or keylogger), the application is also run when the actual binded file is run.

Why is Binder used???

As I have written in previous articles, generally, RATs and keyloggers are detected by most antiviruses. Also, you can’t send victim a RAT or keylogger and ask him to install it on his computer
. So, you have to bind that RAT or keylogger with say image, movie or song (any file depending on victim) and then ask him to run this binded file on his computer.
When the victim runs our binded image (binded with keylogger) on his computer, keylogger is installed on his computer and we can easily obtain all his typed passwords.

How can I get a Binder???

There are many binders out on web. Just Google “Download binder” and you’ll get a list of Binders.

How to use Binder???

I am writing an article on how to use Binder to hide your trojans and viruses. Will post this article very soon.
This is all about Binders. I hope you are now well approached with this hacking software – Binder – which is used to hide RATs and Keyloggers. If you find any problem in using Binders, please mention it in comments.

Related Posts:

  • How Hackers Steal Passwords using the SEToolkit Welcome back my fellow hackers! In the past few articles we’ve been preparing to steal credentials from users on our local network, and today we’re … Read More
  • Kali Tools: Using mitmproxy Kali is chock-full of useful penetration testing tools, though some of them are less practical from a penetration testing perspective, and instead d… Read More
  • Kali Tools: Using mitmproxy Kali is chock-full of useful penetration testing tools, though some of them are less practical from a penetration testing perspective, and instead de… Read More
  • Kali Tools: Vega There seem to be a virtually limitless number of free, quality, and open source penetration tools that come with the Kali operating system. Once you… Read More
  • Kali Tools: SSLStrip Today we’re going to be taking a closer look at a useful Kali Linux tool called SSLStrip. As the name implies, it is useful for hijacking HTTP traff… Read More

0 comments:

Post a Comment