Description: An example of using Windows Socket to achieve a simple backdoor Trojan functionality: running iServer, will be listening port 9626 and will be copied to the System32 directory after his self-starting hosts can be connected through iClient Cmd command execute in order to achieve simple control purposes
To Search:
File list (Check if you may need any files):
Server.dfm
Server.pas
Client.dfm
Client.pas
iClient.cfg
iClient.dof
iClient.dpr
iServer.cfg
iServer.dof
iServer.dpr
Server.ddp