Description: <div style="text-align: justify;"> Megapanzer is a trojan horse that disguises as any kind of file type and when executed on a victims system it installs itself that way it is started automatically after each reboot. Once the trojan is started it connects back to its client to receive further instructions. Megapanzer is programmed that way the owner can send his orders manually or via script containing all commands to execute as soon as a victim system establishes a reverse connection.<br><br>Megapanzer's main purpose is extracting sensitive information (like username and passwords) from a victim system and SSL Man-in-the-middle-attacks for browser based ebanking sessions. Also the regular features you know from other RAT’s like a remote command line, process and service handling etc. are supported but are rather secondary.<br><br>The video shows in seven simple steps how to take over an ebanking session of a victim and which tools you need to accomplish this stunt. You can download a high resolution version of the below video here.<br><br>Thanks to Ruben Unteregger / Carrumba ( megapanzer [] gmail.com ), the original author of Megapanzer for uploading this video to SecurityTube! We would request you to make the source and binary available to the community for fun and profit :) <br><br><br></div><br><style type="text/css"> body { background: #FFF; } </style>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.