About Toolkits

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by joemasters, Jul 14, 2011.

  1. joemasters

    joemasters Private E-2

    I have two questions about remote access Trojans like the tool kits like Phoenix and Black Hole.

    One; suppose I visit a site and my virus protection doesn’t catch it, and it downloads to my computer, is that it? Do I automatically get infected? Is there anything after that that could prevent it from being executed? Does the person on the other end have to activate it or something?

    Two; I understand that these tool kits are mainly used for creating botnets, but do they also allow the person in control to copy files from infected computers’ hard drives? If so, do they all allow this, or only some?

    Thanks.
     
  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member


MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds