
- #ANGRY IP SCANNER 2.15 INSTALL#
- #ANGRY IP SCANNER 2.15 ZIP FILE#
- #ANGRY IP SCANNER 2.15 ARCHIVE#
- #ANGRY IP SCANNER 2.15 PLUS#
The original Web site is, so he registers the domain. To make the phishing scam appear as legitimate as possible, he decides to register a domain name that is similar to the original Web site. He will need to copy all the phishing Web site files to a Web server that can host them. He gives his file the same name as the original program (ccna.exe) from the legitimate Web site, and copies it to the same directory where the first ccna.exe was located (overwriting it). Phoenix now has created his new program to host on his phishing Web site. Netcat will run in the background and listen for incoming connections on TCP (Transmission Control Protocol) port 50.Įxecuting setup.exe on completion Setting Up the Phishing Site
#ANGRY IP SCANNER 2.15 INSTALL#
When his boss launches the CCNA program, it will unzip the files and run setup.exe, which will install both the legitimate practice test software and Netcat. When the wizard prompts him for the name of the executable to launch when the unzipping process is complete, he chooses setup.exe (see Figure 2.17). Phoenix selects Unzip automatically (see Figure 2.16) so that the archiving is transparent to the user.
#ANGRY IP SCANNER 2.15 ZIP FILE#
He launches WinZip Self-Extractor and chooses Self-extracting Zip file for Software Installation (see Figure 2.15).
#ANGRY IP SCANNER 2.15 ARCHIVE#
He now has his Trojan program, which he saves as setup.exe.īecause the installation is dependent on many other files, Phoenix needs to create a self-extracting archive that bundles all the files necessary for installation. Now Phoenix is ready to bind the stub (Netcat) to the executable (backup.exe). Icon 7 and Icon 8 are two good options (see Figure 2.14). From here, he chooses an icon that looks like a standard install program. In the Icon Preview box, he clicks (none) to bring up the Change Icon dialog box. To make this Trojan appear legitimate, Phoenix selects an icon that looks like a standard install program. He chooses to melt Netcat by going to the Options menu and choosing Melt Stub After Execution (see Figure 2.13). Although choosing to melt the file is ideal to avoid detection, it does have a side effect: If the file is gone, Phoenix cannot launch it again when the computer starts up. Trojan wrappers often have this option to melt, or remove, all traces of the malware executable after the software is running in RAM. This helps to prevent users from detecting his malware on their computer. He enters the complete path to the backup.exe executable file, leaves the other options at their default, and then clicks OK.īefore Phoenix binds the two files together, he first makes sure that all traces of the Netcat executable will be removed after it launches. He selects Execute File in the Select command to add drop-down box (see Figure 2.12).
#ANGRY IP SCANNER 2.15 PLUS#
Next Phoenix adds the legitimate program by clicking the plus sign again to add it. Phoenix clicks OK after he finishes configuring Netcat.

The default value is not to modify the Registry. For example, Phoenix can configure it to load in HKEY_LOCAL_MACHINE\Microsoft\Windows\Current Version\Run so that the Trojan will launch every time the computer starts. Optionally, Phoenix can select to launch the Trojan again when the computer starts up by setting the Registry Startup Method option. The -e cmd.exe option tells Netcat to execute the MS-DOS command shell. This option configures Netcat to listen ( -L) in the background for incoming connections to TCP port 50.


Sometimes trying to launch them both at the same time (synchronously) might cause problems, so asynchronous execution is a safer option. This option installs the Trojan separately from the main executable. This is the path to Phoenix’s Netcat Trojan. This option enables you to bind a file to another.
