• 0 Posts
  • 90 Comments
Joined 3 months ago
cake
Cake day: June 23rd, 2024

help-circle



  • Trojan is any malware that pretends to be a legit program. It does not need to have backdoor or info stealing capability even though most malware (trojan or not) today does. For example, pre-Internet trojans might just invisibly install themselves along the actual program they were bundled with and then nuke the system on a certain date. Antivirus companies would even advance the date on their systems in hopes of detecting these and being the first to develop a patch.

    But since this program is not malicious, it just straight up hogs system resources and/or crashes it due to a mistake, it cannot be considered malware and therefore not a trojan.

    Certain Intel processors from around 2000 would crash everything when loading the 4 bytes F0 0F C7 C8 into a specific register. Would you consider this a backdoor because it allows any program to crash the system? I wouldn’t say so, crashing Windows 98 was probably not too hard anyway…













  • I once found a workaround on a trashpicked Android 5.1 phone by Huawei. There was a shitty third-party keyboard during the setup, so I tapped around and found that it has DLC themes. Attempting to download one resulted in a popup “Offline? Check network settings” with a link into the Settings app, where I could set a lock screen passcode and then remove it, which nullified FRP.

    Later, I found a YouTube video with instructions for another exploit, which somehow reached Settings via the screenshot shortcut and then attempting to share it via Gmail. I imagine weird phone brands will have several exploits like this.