About Me

ABOUT Greetings, Thanks for visiting techmindug.blogspot.com I am Opendi Cornelius Founder , CEO and Author of this blog. I work as an Application and Web Based Programmer in my spare time. Connect With Me On : • Facebook • Google+ • Twitter • LinkedIn The genesis behind techmindug.blogspot.com is my passion for anything even remotely related with technology. My areas of interest include Blogging, Technology, Computer Systems, Gadgets, SEO (Search Engine Optimization) , WordPress, Programming, Software Reviews and of course, surfing the net all the time. Techmindug.blogspot.com is a Blog Site where I write on the above mentioned areas of interest. Please feel free to share your valuable suggestions to enrich this blog. I am much thankful for your visit and I look forward to your visit again. If you face any issues , please send me your feedback through the Contact Form. Regards, Opendi Cornelius

Monday 19 May 2014

How To HackCreate a MalwareVirusTrojan Horse

How To Create a Malware/Virus/Trojan Horse that can take control of another computer, steal passwords, access data, format/delete files and do a lot of damage to the victim

1. First disable ur antivirus and download a 3mb zip file of ProRat from http://www.prorat.net/downloads.php ..Why u should disable ur security programs is b'se it may give alerts or delete some of the files you downloaded. The reason for this is that some security programs may recognize ProRat as hack tools. Virus, Trojan, Dialer or similar programs will not be infected to ur system from the programs u download. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be “pro”.

2. Open up the program (It has a black horse with wings as a background) NO INSTALLATION REQUIRED

3. Next u will create the actual Trojan file. Click on Create and choose Create ProRat Server.

4. Next put in ur IP address so the server could connect to u. If u don’t know your IP address click on the little red arrow to have it filled in for you automatically. Next put in ur e-mail so that when and if a victim gets infected it will send you a message. U will not be using the rest of the options.

5. Click on the General Settings button to continue. Here u will choose the server port the program will connect through, the password u will be asked to enter when the victim is infected and u wish to connect with them, and the victim's name. As u will see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

6. Click on the Bind with File button on the left to continue. Here u will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. Example use an ordinary text document.

7. Click on the Server Extensions button to continue. Here u choose what kind of server file to generate. Stick with the default because it has icon support, but exe’s looks suspicious so it would be smart to change it.

8. Click on Server Icon to continue. Here u will choose an icon for ur server file to have. The icons help mask what the file actually is. Example choose the regular text document icon since ur file is a text document.

9. Finally click on Create Server at the bottom to, create the server file.

10. U would probably rename it to something like “Funny Joke” and send it as an attachment to some people. U could also put it up as a torrent/download pretending it is something else, like the latest game or software that just came out so u could get people to download it.

11. Now, wait and see what happens when a victim installs the server onto his computer and what the ucould do next.

12. Once the vivtim runs it, the trojan will be installed onto his/her computer in the background (undetected). U will then get a message telling u that the victim was infected. U will then connect to his/her computer by typing in his/her IP address, port and Connect. U will be asked for the password that u made when u created the server. Once u type it in, u will be connected to the victim's computer and have full control over it.

13. Now u have a lot of options to choose from on the ProRat programme. U have access to all the victim's computer files, u can shut down his/her pc, get all the saved passwords off his/her computer, send a message to his/her computer, format his/her whole hard drive, take a screen shot of his/her computer, take a webcam shoot of the victim to see how s/he looks like and so much more.
_
_
_
U can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. U can as well program ur own viruses and Trojans that can easily bypass antivirus programs. (Next time I'm gonna tell/show u how u can program ur own super virus, worms and trojans)

0 comments:

Post a Comment