A Trojan horse is any malware that misleads users of its true intent. The trojan developed by me consists of a PowerShell payload, which on execution on the victim system, triggers a reverse shell back to the attacker system’s IP address, giving the attacker full access to the victim system. Trojans are a common form of malware found in today’s society. However, the following trojan holds the power to evade Windows Defender (built-in windows antivirus). This attack can be used for penetration testing and further practices like privilege escalation, reconnaissance, etc. Downloading and executing the v.bat file will automatically download and execute the trojan, i.e., the rs.exe file. The trojan has been obfuscated in such a way that Windows Defender is not able to detect it and hence, allows it to run on the victim machine.
Press Release regarding 1st and 3rd rank of IEM-UEM in West Bengal Private Engineering College Rankings by Times of India
Press Release in Ananda Bazaar Patrika regarding the very First Indian app by the students for the students
Enginious under the banner of IEI-IEM Electrical & Mechanical students’ chapter has been published in IEI newsletter