Written by Doc~ 
Released 
3.29.02
New Startup Methods
 
www.megasecurity.org This version is intended for programmers and rat authors. These 
are some newer startup methods all methods have been confirmed to work on 2k. 
Also included are new ways to hide and refer to files without giving their 
location away. Assume that these methods have not been tried on other versions 
unless noted. Enjoy please keep this version of this article to yourself I will 
release a less intensive one on Megasecurity some time later. If you have 
questions, e mail me and if it works on another os version let me know I m very 
intrested if this paper has relivance toward other OS versions. 
 
 
 Templated Directories 
 
 
 
 Running Server as a .htt file Resize(); Kid awhile back coded a godwill 1.06 but didn't release it 
because he wanted to keep the exploit private. Abou 4 people have this code. It 
compiles the exe on the victims hard driver and runs it, without requiring 
reboot. Truly a masterpiece. Thanks kid for letting me share it. 
 
 %SystemRoot%\web\printfld.htm execute c:\winnt\web\printfld.hm 
 
 
 No one is perfect if there is false information or spelling and 
grammatical errors please e mail me and help me correct them I am firmly against 
false information and have gone to great lengths to verify everything mentioned 
above        -> E mail -> http://tnt2.ath.cx:5080/kernel32/[email protected]?subject=false 
info/error
This article and the oppinions 
are the sole belief of the author, and not those of the website. The author 
acknowledges that there maybe some false information, the author releasing 
everything at this time fully believes everything to be true, and unless proved 
otherwise, should be taken so. By reading and or distributing this information 
you the user are responsible for any actions or responses that may occur. 
Windows for easy 
refrencing uses variables for their most used folders e.g. %systemroot% refers 
to c:\winnt that is a common one but try %webdir% or %userappdata% This will 
help to make the actual path of the server 
obsecure.
Example
%webdir%\server.exe
The average user wont know 
where to find it. And if you use a common exe for example sol.exe or calc.exe, 
it will make it hard when they do a search for the exe to distinguish them.
In case you 
aren't aware, .htt files are used as the code for example control pannel. There 
of course is control.exe and the *.cpl files that go along with it then there is 
c:\winnt\web\controlp.htt 
  
  
     Contents of controlp.htt 
  
     
Heres a portion of the code 
upclose
var L_Intro_Text = "Use the settings in Control Panel to personalize 
your computer.";
var L_Prompt_Text = "Select an item to view its 
description.";
var L_Multiple_Text = " items selected.";
If you run 
control pannel you will see that text in on the left hand side of the window. 
This may not be new information to you but lets move on. A simple way to ensure 
your trojan is running. Is either create a program to check on the server or 
just call the server itself. Code example below:
function Load() 
{
Info.innerHTML = L_Intro_Text + L_Prompt_Text;
// fix styles
var 
L_SystemFont1_Text = "MS Sans Serif";
var L_SystemFont2_Text = "MS Shell 
Dlg";
var L_SystemFont_Text = "Tahoma, Verdana";
var tr = 
document.body.createTextRange();
alert('executed code');
if 
(navigator.cpuClass != "Alpha") {
tr.collapse();
var actualFont = 
tr.queryCommandValue("FontName");
if (actualFont == L_SystemFont1_Text || 
actualFont == L_SystemFont2_Text)
document.body.style.fontFamily = 
L_SystemFont_Text;
} else
document.body.style.fontFamily = 
L_SystemFont_Text;
// call our Resize() function whenever the window gets 
resized
window.onresize = Resize;
}
Thats an example of injecting the code. Heres 
where you will be privi to Kid Arcades best work yet. 
julius caesar:
venni viddi vicci
Open 
contropl.htt
Magus
I m getting an error with Interface Object I got it 
to successful go into the control pannel without complications but it pops up 
with the error like in a web page. Any ideas?
Later' 
file:///::{20D04FE0-3AEA-1069-A2D8-08002B30309D}/::{21EC2020-3AEA-1069-A2DD-08002B30309D}
cpl 
= control pannel extension
HKEY_CURRENT_USER\Environment -> 
%USERPROFILE%\Local Settings\Temp may execute 
file
file://%userappdata%\Microsoft\Internet Explorer\Desktop.htt = 
C:\Documents and Settings\Administrator\Application Data\Microsoft\Internet 
Explorer HKEY_CLASSES_ROOT\CLSID\{00021400-0000-0000-C000-000000000046} 
Thanks goes to the following people in no special 
order:
Cyberfly, M_R and Magus(Thanks for all your help and support :-) ), 
weed(congrats bro), SilenceGold, dragnet for starting up the kazaa client when 
needed =), #tnt, Connected, and ap0calaps. Also a huge thank you too Olympus(http://www.lithiumrat.org/) 
for developing a program for my needs, and to mf4(areyoufearless.com) for also developing 
code to help me, and for both of their constant programming help. If you have 
been forgotten I m sure I was having a memory lapse thanks to you too.