Showing posts with label Remote Administration Tools. Show all posts
Showing posts with label Remote Administration Tools. Show all posts

Thursday, July 21, 2011

Cybergate Rat Tutorial How to Hack pc using Cybergate Rat

33 comments
This is one of the good Tutorial..:)

Firstly, Start off by downloading Cybergate RAT:
Download Mirror 1
Download Mirror 2

Now, Go to No-ip.com

Sign Up and everything. now log in and press Add Host

[Image: No-ipcom3.png]

Now name your host to whatever you want.. i will name my host to Cocacolanerds.no-ip.biz. Just follow theese settings and press Create Host.

[Image: No-ipcom_4png.png]
[Image: No-ipcom_5.png]

Congratulations! You are done with The No-Ip! :)

Let's move on with the Cybergate RAT

Open Up Cybergate.. (Wich you downloaded in the beginning)

Now click Control Center - Start

Click Control Center - Options - Select Listening Ports And Do Following:

[Image: Cerberus_4.png]

Good, You Are Done With The Settings! Now, let's move on to the Virus Creation :).

Click Control Center - Builder - Create Server. Make a new User named Hacking. Press Ok.

[Image: Cybergate_5.png]

Mark the user "Hacker" And press Forward.

Now you should have something like this;

[Image: Cybergate_8.png]

Press 127.0.0.1 | Port 999 and press Delete..:

[Image: Cybergate_9.png]

After that, Click Add.

Now, A Box should pop up saying: 127.0.0.1:81. Like this:

[Image: Cybergate_11.png]

Remove everything and change it with the No-ip adress you host you added.. So let's say you used example.no-ip.biz. Change 127.0.0.1 to example.no-ip.biz and the :81.. Since we used port 82, Change :81 to :82, so it should look like this:

[Image: Cybergate_12.png]

But since my No-ip adress was cocacolanerds.no-ip.biz, i have to change it to MY. but i keep the :82...

Now Change the
Identification: remote
Password: cybergate

To This:
Identification: Cyber
Password: 123456

Good! You are now done with that :). Let's move on to "Installation"

Use the Exact same settings as i do. :

[Image: Cybergate_15.png]

Good, We Skip Message. We Skip Keylogger. In the Anti Debug Have everything checked

In The Build Server: Use Google Chrome Passes and UPX.. (Makes the server smaller)

And press Create Server. Good, You do now have your RAT server complete!

If your RAT doesent work. check following things:

Non-Connecting RATs

1. You are properly port-forwarded if using a router.
2. You have the No-IP Client installed and running.
3. Your DNS entries are correctly spelled when building your server.
4. The password in Listening Ports and the password your server uses are identical.
5. You are Listening on the correct ports.
6. Your Firewall is letting connections through on the port you're listening on.
7. Your server is added to excluded files in your Antivirus and Firewall.
8. Your server injects explorer.exe instead of the default browser.

How to port forward..

Go to Portforward.com and lookup your Router, there shall be a guide on how to port forward on it :). and if you are on a modem.. then you don't need to port forward.

Enter Start - Run . Command. Type Ipconfig

In the "Standard Gateway", That is your Router IP. Type that into your web browser. Log in, And Port forward port: 82

Restart your router and you are done! :).. Just send the RAT Server to any slave OUTSIDE your network.

Hope you enjoyed watching this tutorial & i wish you all the best with your victims ;)

How To Hack Remote of a Computer Hack Computer pc Using Lost Door 4.0

3 comments

 What the things you Need?
1. A Free Account in www.no-ip.comand there you need a free Host.
2. Lost Door Tool
3. May be you need for Microsft Frame Work ( Must Install it Mostly Hacking tools did not work
     without it
4. A Cup of Tea or Coffe or a glass of Milk.. i also drink Milk..:)

so LEarn Tutorial Step by Step.




  • Download Lost Door ( Password for Extracting is umerrock )
  • Extract the files in your HArd Drive and Accept it
  • After it is open, right click on the window and click on create server
  • Now enter your IP address and DNS here. Leave the rest of the field as it is.
  • Now click on the ‘Options’  tab and choose the options as you want. To activate an offline keylogger is a good practice.
  • Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
  • Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.

 After Create SErver SEnd this File to your Victim, you can upload your server on mediafire and share it with friends and enjoy using her pc..:)

HAck Email/ Computer with ProRat full Tutorial

50 comments



Hack any e-mail account password
1First of all Download ProRat

Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2Open up the program. You should see the following:

 

3Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

 4) Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5)  Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:



6Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.



7) Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8) Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.


9) After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10) You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11) Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.



12) Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13) The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14) Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15) Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.



As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Do you have questions, comments, or suggestions? Feel free to post a comment!

Wednesday, July 20, 2011

How To Hack pc Using Dark Comet Rat with No ip

3 comments



Once your logged in ,add a host.





Next:


  • 3 : Choose your host name.
  • 4 : Your ip address
  • 5 : Create host.





No-Ip is set ,now lets download the DUC to update your ip automatically!
DUC download : http://www.no-ip.com/downloads.php
Start the DUC client after installation.



Now to download DarkComet ,here can you find some info and download.

After installation ,open DarkComet client. If you don't want to use the DUC client for No-IP you can do it with DarkComet. Here is how to do it :



Now lets build the server ,go to Edit Server => Server Module.

Press Generate a few times



Next:

  • 1 : Enter your no-ip host name
  • 2 : Choose your port
  • 3 : Test Network
  • 4 : Add this to your configuration
  • 5 : Click your host to set it.



Make sure you port is open! You can check it here

Next step you can choose but this is what i use ,if you don't know what to do yust copy the settings.



Same for the next one



If you want keylogs :



Now its time to build your server!



After building you need to crypt your server to get it FUD for spreading!

Now to see your vics ,press +listen ,set your port and press listen!



Hope you guys like it ,if you copy this tut give me some credit then pls.
If you have any questions feel free to ask.