Archive A Reconstructed © MegaSecurity Database
Hanuman
Released 23 years, 6 months ago. October 2002
Copyright © MegaSecurity
By JunkCode
Informations
| From | India |
| Author | JunkCode |
| Family | Hanuman |
| Category | Remote Access |
| Version | Hanuman |
| Released Date | Oct 2002, 23 years, 6 months ago. |
Additional Information
Server:
size: 10,272 bytes
port: 3333 TCP
startup:
none
Author Information / Description
--------------
Hanuman Server
--------------
DOS SHELL DAEMON
----------------
Hanuman Sever is a daemon that runs on port 3333 [ 0xD05 <- DOS ].
anyone who connects to this port when the server is running will get a dos shell or rather
a command intepretor ( because Hanuman Server runs on NT based environment too.. )
In Win9x/ME Command.com is used as the command intepretor.
In WinNT/2k/XP Cmd.exe is used as the command intepretor.
NOTE
----
There is no authentication, it means that anyone can connect to this port and can cause
havoc to your machine.. so, be careful before giving your IP-Address or Hostname to any
one..
JunkCode
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.