Stealth Redirector 2,0
Released 20 years, 11 months ago. December 2003
Copyright © MegaSecurity
By Tia86
Informations
From | Italy |
Author | Tia86 |
Family | Stealth Redirector |
Category | Stealth Proxy |
Version | Stealth Redirector 2,0 |
Released Date | Dec 2003, 20 years, 11 months ago. |
Language | Delphi, Source included |
Additional Information
Server:
size: 205.960 bytes
port: 5500 TCP
startup:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "DLL Process Control"
Author Information / Description
WHAT IS STEALTH REDIRECTOR?
Stealth Redirector is likely a proxy system.
The function of this software is get total anonymity exploit
the victim pc's.
- Why i write this software?
Suppose you have the control of a pc (egg. friend pc) and
you will use this pc for bouncing your connection, how do you
do?
With Stealth Redirector is simple!
eg. You will connect to Cyberspace.org telnet service and not
leave your ip in the log files.
First you connect to the victim with the client (Stealth
Redirector Client) and create a TCP Redirect.
At the "Redirect Host" write "cyberspace.org",
at the "Redirect Port" write "23" (telnet service) and at the
"Listen Port" write a number between 1-65535 (eg. 1024).
Now connect with your telnet terminal at the victim with the
port you choice (eg. 1024) and you get the prompt of the
cyberspace service!
- How it work?
Stealth Redirector take the packets from a port and redirect
these packets at a remote host.
Basically is a port redirect software.
- The functions of Stealth Redirector
TCP Redirect: you can create a multiple TCP Redirection.
FTP Redirect: you can create a FTP Redirection.
Netstat Remoto: you can view the list of the connections of
the victim
LOG Destroy: with this function, Stealth Redirector search in
the root of the Windows path (eg. if Windows path
is 'D:\Windows', the program search in 'D:\') all *.log files
and
replace your IP with localhost IP (127.0.0.1).
Stato del server: the state of the Stealth Redirector Server.
- Installation
The installation mode is similar of the most Trojans.
The first time you execute, you get a windows with an error.
The program automatically copy itself in the Windows directory
(eg. 'D:\Windows') and
create a value from the registry at this key:
HKLM\Software\Microsoft\Windows\Currentversion\Run or HKEY_CURRENT_USER\Software\Microsoft\Windows\Currentversion\Run
for re-execute the server all times windows run.
Tia86
If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.