While it can be used for making mischief (such as making sound files play out of nowhere, change screen colors, etc.), it can also read keystrokes that occurred since the last boot-a capability that can be used to steal passwords and credit card numbers. SubSeven has been used to gain unauthorized access to computers. The Master Password for SubSeven DEFCON8 2.1 Backdoor is acidphreak. For Version 1.9 the master password is predatox and 14438136782715101980 for versions 2.1 through 2.2b. A deeper reverse engineering analysis revealed however that "SubSeven's author has secretly included a hardcoded master password for all of his Trojans! The Trojan itself has been Trojaned". Ĭonnections to Sub7 servers can be password protected with a chosen password. The Sub7 server could also be configured to notify the controller of IP address changes of the host machine by email, ICQ or IRC. Customizations possible with the Sub7 server editor included changing the port addresses, displaying a customized message upon installation that could be used for example "to deceive the victim and mask the true intent of the program". Additionally the server program could be customized before being delivered by a so-called server editor (an idea borrowed from Back Orifice 2000). On the client-side the software had an "address book" that allowed the controller to know when the target computers are online. penetration testing features, including a port scanner and a port redirector."text2speech" voice synthesizer which allowed the remote controller to have the computer "talk" to its user.features which were presumably intended to be used for prank or irritating purposes including:. This included the ability to disable the local use of the account and read the chat history taking over an ICQ account used on the target machine (back then the most popular messaging service) added in version 2.1.retrieving a listing of recorded and cached passwords.sound files from a microphone attached to the machine.Sub7 has more features than Netbus (webcam capture, multiple port redirect, user-friendly registry editor, chat and more).Īccording to a security analysis, Sub7's server-side (target computer) features include: Sub7 is so invasive, he said, that anyone with it on their computer "might as well have the hacker standing right next to them" while using their computer. Computer security expert Steve Gibson once said that with these features, Sub7 allows a hacker to take "virtually complete control" over a computer. The server is the program that the host must run in order to have their machines controlled remotely, and the client is the program with a GUI that the user runs on their own machine to control the server/host PC. Like other remote admin programs, Sub7 is distributed with a server and a client. In June 2021, a completely new alpha version was released with a similar look and feel to the original release, but it is not developed by the original author. The website that claimed to do this is no longer active. It was very buggy and was not written in Delphi which the original author used. SubSeven 2.3, released on March 9, 2010, was revamped to work on all 32-bit and 64-bit versions of Windows and includes TCP Tunnel and Password Recovery for browsers, instant messengers and email clients. In 2006 () re-opened with hundreds of thousands of users, and has kept Sub7 alive with clean downloads and support and new software releases. No development had occurred in several years until a new version was scheduled for release on February 28, 2010. Until today, "mobman" claims to be the creator, but the original ownership of the software is not yet clearly attributed to a specific individual. Some sources claim that the software has been developed by an unknown Romanian programmer. Sub7 has been claimed to be the creation of a hacker with the handle "mobman". This section needs expansion with: early history.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |