388 lines
13 KiB
Plaintext
388 lines
13 KiB
Plaintext
|
||
|
||
|
||
|
||
K-K-Ðs GUIDE TO
|
||
=================
|
||
USING TROJANS
|
||
===========
|
||
|
||
|
||
|
||
Disclaimer
|
||
==========
|
||
Ok im only gonna tell you this once (lets face it i dount want to just every
|
||
txt file these days has one) its not my fault
|
||
for any damage caused by the information in this txt file if you those to do
|
||
any of the activities then it your own fault.
|
||
|
||
Contents
|
||
========
|
||
|
||
1: Whats a trojan?
|
||
2: Why would any one want to use them?
|
||
3: do"s and dounts
|
||
4: Using Netbus
|
||
5: Getting IPs
|
||
6: Im in now what?
|
||
7: Using SubSeven
|
||
8: Ports and ports scanning
|
||
9: Using BO2K
|
||
10:The pigs are at my door!
|
||
|
||
|
||
Whats a trojan?
|
||
===============
|
||
Ok well a trojan is a peice of software used to hack into brake into and spy
|
||
on some ones computer there are normaly two main
|
||
parts of a trojan a server and a client the server is a program that needs
|
||
to be installed on some ones computer in order for
|
||
you to hack them and a client is the part you control/hack the computer with
|
||
so if you think about it a trojan is like a
|
||
bugging transmitter it lets you spy on some activitys while there on the
|
||
internet.
|
||
|
||
Why would any one want to use a trojan?
|
||
=======================================
|
||
Well there are many reasons realy maybe you want to snoop round some ones
|
||
computer just to see whats on there or maybe you
|
||
want to keep tabs on some one to either see if there talking about you
|
||
behind you back or maybe you just want to have some
|
||
fun and scare some one shitless.
|
||
|
||
Do"s and dounts
|
||
================
|
||
Dount infect people you dount know very well for the simple reason there dad
|
||
could be a pig and have lots of connections
|
||
or he could be a programmer or something and they know how to trace you
|
||
dount just delete random file i mean if you do this
|
||
your realy just BORING i mean for one you wount be able to watch them second
|
||
if they found out it was you,you will get done
|
||
for criminal damage the only time you start to delete is when you realy HATE
|
||
them.
|
||
|
||
|
||
|
||
|
||
A Beginners guide to
|
||
======================
|
||
NetBus
|
||
========
|
||
|
||
YOU WILL NEED
|
||
==============
|
||
NetBus 1.7
|
||
a computer connect to the net
|
||
a chat program iCq MSN MESSENGER YaHoo! messenger
|
||
|
||
Victims
|
||
=======
|
||
Ok lets say you realy dount like some one and you have there hotmail/yahoo
|
||
email address ok now make a new hotmail/yahoo
|
||
account (just for a bit of cover) add them gain there just talk to them get
|
||
to know there intrests then asuming you have
|
||
NetBus there will be a progam called "Patch.exe" ok DOUNT open it this
|
||
little program is the server I.E the program that
|
||
must be running on the victims computer for you to hack them. So you need to
|
||
send it to them lets say there intrest is
|
||
Monster trucks rename the server Monster trucks game or monster truck rally!
|
||
i mean its not to hard but the victim has to be
|
||
attracted to this file enough for them to accept it
|
||
|
||
Getting IPs
|
||
===========
|
||
Ok so whats an IP address IP stands for Internet Proticol an IP address
|
||
looks some thing like this 217.32.246.75 it a number
|
||
that identifies one computer from another (your ip address changes every
|
||
time you come online) the way you get an IP address
|
||
is from the netstat -n command from MS-DOS. Before you send them the server
|
||
file go to MS-DOS and type in Netstat -n
|
||
and it should come up with some thing like this
|
||
|
||
C:\Windows>netstat -n
|
||
|
||
Active Connections
|
||
|
||
Proto Local Address Foreign Address State
|
||
TCP 127.0.0.1:1539 64.4.13.32:1863 ESTABLISHED
|
||
TCP 127.0.0.1:1113 208.185.211.71:80 ESTABLISHED
|
||
TCP 127.0.0.1:1122 217.32.246.75:80 ESTABLISHED
|
||
|
||
C:\Windows>
|
||
|
||
It should look like that any we give or take a few IPs now send them the
|
||
server once they have accepted the server file
|
||
type in Netstat -n again and some thing like this should come up
|
||
|
||
C:\Windows>netstat -n
|
||
|
||
Active Connections
|
||
|
||
Proto Local Address Foreign Address State
|
||
TCP 127.0.0.1:1539 64.4.13.32:1863 ESTABLISHED
|
||
TCP 127.0.0.1:1113 208.185.211.71:80 ESTABLISHED
|
||
TCP 127.0.0.1:1122 217.32.246.75:80 ESTABLISHED
|
||
TCP 127.0.0.1:2134 64.254.113.45:1302 ESTABLISHED (Ok this
|
||
is there IP address)
|
||
|
||
you can tell because it is a new active connection it wasnt there before.
|
||
ok now you have there IP put it into NetBus (port 12345) and hit connect
|
||
hopefully if you have done it right it should say
|
||
some thing like "Connect NetBus Version 70
|
||
|
||
Im on now what?
|
||
================
|
||
|
||
Well your now in there computer just look at some of the options im mean
|
||
come on
|
||
|
||
Open CD-ROM dive Close CD-ROM drive
|
||
Show images
|
||
Swap mouse bottons
|
||
Run programs
|
||
Send messages
|
||
Screendump(see whats on there screen)
|
||
Get computers info
|
||
Regedit
|
||
Play run sounds
|
||
Shut down computers
|
||
Active windows
|
||
Control mouse
|
||
Keylogger(see what there typing on there keyboard)
|
||
and of course File manager
|
||
|
||
Just try not to let them know you in there get what i mean or they will
|
||
catch on to you:-)
|
||
ok now you can use NetBus lets learn some thing a little harder
|
||
SubSeven2.1.3 Bonus by mobman
|
||
|
||
|
||
A Beginners guide to using
|
||
============================
|
||
SubSeven
|
||
==========
|
||
|
||
|
||
Ok now there a 3 parts to SubSeven a client a server and an edit server now
|
||
this is the good part of SubSeven insted of
|
||
some one telling you what port you should run on what the server icon should
|
||
look like and how the server should start up
|
||
you can choose your self ok open Edit server now it will first say at the
|
||
top server select the server then start up
|
||
method(s) if i wure you i would click all of them expet Win.ini then victim
|
||
name leave it blank here we go E MAIL
|
||
NOTIFY! this realy is a good option type in your email addres where it says
|
||
Notify to then server if you use HOTMAIL
|
||
the server will be MAIL.HOTMAIL.COM if you use Yahoo! it will be
|
||
mx1.yahoo.com and here are some other servers.
|
||
|
||
hotmail.com -> mail.hotmail.com
|
||
yahoo.com -> mx1.yahoo.com
|
||
hushmail.com -> www.hushmail.com
|
||
rocketmail.com -> mta1.rocketmail.com
|
||
altavista.net -> spool.globecomm.net
|
||
angelfire.com -> mta1-mail.angelfire.com
|
||
juno.com -> a.mx.juno.com
|
||
mailcity.com -> mta5-mail.mailcity.com
|
||
|
||
Ok now the startup port now it will have the defaut port in there 27374 you
|
||
can leave it at that there no problem with that
|
||
but you can change it to some thing like 1234 or 124356 what ever you want
|
||
then server password it is a good idia to use this
|
||
so people carnt steal your victims then heres a good one enable fake error
|
||
message this lets you make an error messager
|
||
so when the victim opens it the will see an error like "COULD NOT OPEN FILE"
|
||
but use what ever you want then in the top
|
||
right change server icon! this is realy good for making the server look like
|
||
games and things then save your server and now
|
||
your ready to send the server to some one (do the same thing as you did with
|
||
NetBus MS-DOS netstat -n)then hit connect it
|
||
will say some thing like "Connected 8:21pm Version 2.1.3 Bonus". here are
|
||
just some of the options on SubSeven
|
||
|
||
Ip scanner
|
||
Computer info
|
||
Home info
|
||
server setup
|
||
keylogger
|
||
send keys
|
||
chat with victim
|
||
THE MATRIX.... :-) this is a gr8 option ill leave you to find out what it
|
||
does....
|
||
Spy (spy on convos)
|
||
iCq TAKE OVER!
|
||
password reciver
|
||
REDEDIT
|
||
App processer
|
||
file manager
|
||
windows manager
|
||
process manager
|
||
webcam spy
|
||
and LOADS more
|
||
|
||
Ports and port scanning
|
||
========================
|
||
ok now once you have a port scanner you can scan random IPs for open ports
|
||
like 27374 and 12345:-) providing they dount have
|
||
password on them here are a few trojan ports worth scanning
|
||
|
||
Ports| trojans|
|
||
----- --------
|
||
31, Master Paradise
|
||
121, BO jammerkillahV
|
||
456, HackersParadise
|
||
555, Phase Zero
|
||
666, Attack FTP
|
||
001, Silencer
|
||
1001, Silencer
|
||
1001, WebEx
|
||
1010, Doly Trojan 1.30 (Subm.Cronco)
|
||
1011, Doly Trojan 1.1+1.2
|
||
1015, Doly Trojan 1.5 (Subm.Cronco)
|
||
1033, Netspy
|
||
1042, Bla1.1
|
||
1170, Streaming Audio Trojan
|
||
1207, SoftWar
|
||
27374,SubSeven
|
||
1245, Vodoo
|
||
1269, Maverick's Matrix
|
||
1492, FTP99CMP
|
||
1509, PsyberStreamingServer Nikhil G
|
||
1600, Shiva Burka
|
||
1807, SpySender
|
||
1981, ShockRave
|
||
1999, Backdoor
|
||
1999, Transcout 1.1 + 1.2
|
||
2001, DerSpaeher 3
|
||
2001, TrojanCow
|
||
2023, Pass Ripper,,,
|
||
2140, The Invasor Nikhil G.
|
||
2283, HVL Rat5
|
||
2565, Striker
|
||
2583, Wincrash2
|
||
2801, Phineas Nikhil G
|
||
3791, Total Eclypse (FTP)
|
||
4567, FileNail Danny
|
||
4950, IcqTrojan
|
||
4950, IcqTrojen
|
||
5000, Socket23
|
||
5011, OOTLT
|
||
031, NetMetro1.0
|
||
5400, BladeRunner,,,
|
||
5400, BackConstruction1.2
|
||
5521, IllusionMailer
|
||
5550, XTCP 2.0 + 2.01
|
||
5569, RoboHack
|
||
5742, Wincrash
|
||
6400, The tHing
|
||
6669, Vampire 1.0
|
||
6670, Deep Throat
|
||
6883, DeltaSource (DarkStar)
|
||
6912, Shitheep
|
||
6939, Indoctrination
|
||
7306, NetMonitor
|
||
7789, iCkiller
|
||
9872, PortalOfDoom
|
||
9875, Portal of Doom
|
||
9989, iNi-Killer
|
||
9989, InIkiller
|
||
10607, Coma Danny
|
||
11000, SennaSpyTrojans
|
||
11223, ProgenicTrojan
|
||
12076, Gjamer
|
||
12223, Hack´99 KeyLogger
|
||
12346, NetBus 1.x (avoiding Netbuster)
|
||
12701, Eclipse 2000
|
||
16969, Priotrity
|
||
20000, Millenium
|
||
20034, NetBus Pro
|
||
20203, Logged!
|
||
|
||
|
||
A Beginners guide to using
|
||
============================
|
||
BO2K
|
||
======
|
||
|
||
|
||
BO2K or Back Orifice 2000 is one of the most POWERFULL trojans/admin tools
|
||
out there well for the microsoft environment
|
||
its not just a trojan thought its also a remote network administration tool
|
||
so you can use it to hack and if ur an admin
|
||
it can make your life a bit eisier i belive if you can master this trojan
|
||
you can master any trojan this is realy only for
|
||
advanced users (as it was first made for linux) its default TCP port is
|
||
18006 if its UDPIO the port will be 54320.
|
||
|
||
Make your server
|
||
=================
|
||
Like SubSeven there is an edit server this is called bo2kcfg open it it will
|
||
ask you for ports and passwords just use the
|
||
default port 18006 for TCP networking then it will go onto BO2K server
|
||
configuration select your server (BO2K) and insert
|
||
the BO_PEEP plugin this comes in the zip file adding this plugin will add
|
||
the vid streem option and hijack option BO_PEEP
|
||
also lets the server communicate better with the client then go to the
|
||
stealth sub folder and enable the server to start up
|
||
on the victims startup and you can change some default ports if you want but
|
||
its not a good idia another good plugin to have
|
||
is Rattler v10 this send an email when the user is online but you need to
|
||
configure this from the client. again re-name
|
||
the server and then get the IP from netstat -n now heres some thing
|
||
differnet open bo2kgui this is the client then click the
|
||
little computer in the bottom left it will come up with edit server settings
|
||
name of server well say you named the server
|
||
my pic put my pic in there the server address if there ip is 123.456.78.910
|
||
and ur port is 18006 put in there
|
||
123.456.78.910:18006 then click ok then connect...
|
||
it will say something like <BO2K BACK ORIFICE 1.0> in the server responce
|
||
section now this is pritty hard to master lets say
|
||
you wanna log the victims key strokes you go to keylogging log keystrokes
|
||
then it will say diskfile this is where you wanna
|
||
log the key strokes to type in a path like
|
||
C:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} some where
|
||
they
|
||
will never look then wait for around 20mins then go to stop keylogging and
|
||
send the command then to view keystroke logs
|
||
C:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} then send
|
||
command it will the let you view the logs in the
|
||
server responce section just mess around with it you will get it its one of
|
||
those trojan that you need to work out your self
|
||
theres just so many commands for me to go frew them all but heres some
|
||
options
|
||
|
||
Keylogging
|
||
M$ networking
|
||
TCP\IP
|
||
network mapping
|
||
file manager
|
||
REGEIDT
|
||
and more and belive me there is loads more also you can infect networks with
|
||
this trojan but its not a good idia because
|
||
an admin will spot it right away unless your an admin your self and want to
|
||
use it to well admin things....:-)
|
||
|
||
What if the pigs turn up at your door
|
||
=====================================
|
||
Well as long as it your first offence and you didnt FUCK SOME ONES COMPUTER
|
||
UP just admit that you did it becuase they will
|
||
be able to ask your ISP and the can trace you any time any where and also it
|
||
will give the police the idia that your not
|
||
realy that bad you have admitted it and your ready to face what you did(they
|
||
wount do any thing unless you fucked up some ones
|
||
computer)
|
||
|
||
Any way hope this has helped some one
|
||
|
||
|
||
BY
|
||
K-K-Ð
|
||
-----------------------------------------------------------------------------------------------------------------------------
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|