136 lines
5.8 KiB
Plaintext
136 lines
5.8 KiB
Plaintext
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
+\\ // //\\ || || |||||||||||| || || +
|
|
+ \\ // // \\ || || || || || +
|
|
+ \\ // // \\ || || || || || +
|
|
+ \\ // // \\ || || || || || +
|
|
+ \\ // // \\ || || || || || +
|
|
+ || //||||||||||\\ |||||||||||| ||||||||| || || +
|
|
+ || // \\ || || || || || +
|
|
+ || // \\ || || || || || +
|
|
+ || // \\ || || || || || +
|
|
+ || // \\ || || || || || +
|
|
+ || // \\ || || |||||||||||| ||||||||||| |||||||||||| +
|
|
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|
Yahoo Trojan Attack Guide
|
|
|
|
Written by: Zero
|
|
12-16-2002
|
|
zerotextspy@yahoo.com
|
|
|
|
YAHOOOOOOOOOOOOOOOOOOO!
|
|
---------------------------------------------------------------------------------------
|
|
Introduction
|
|
|
|
Ok, this is not a g-file on how to use a Trojan Horse. This is a file on how to launch a trojan
|
|
attack on ordinary people using Yahoo in chat rooms. This is actually quite simple, but it can
|
|
get aggrivating sometimes since some people have Norton AntiVirus, firewalls, etc. This is more of
|
|
a begginers manual for breaking into other peoples computers.
|
|
|
|
By the Way, to actually practice the information in this file is Illegal! If you are 16 years
|
|
old, or older, then you can be charged as an adult, have your computer taken away, and be in some
|
|
deep shit. So this file is for Informational Perposes only (ha ha thats funny).
|
|
---------
|
|
Things you Need:
|
|
|
|
The Internet
|
|
Yahoo Messenger
|
|
Satanic IP Stealer
|
|
A Trojan Horse (hack'a'tack is good for beginners, NetBus Pro recommended) search
|
|
www.google.com to find them
|
|
--------
|
|
Preparing
|
|
|
|
Ok, first, Open the Satanic IP Stealer program (do it out of a chat room or people will know what
|
|
you are doing). Be sure you are connected to the internet when you open it, or else it will not
|
|
show you your IP Address. When you open it, you will see your IP Address, copy your IP Address,
|
|
or write it down or something.
|
|
|
|
Now goto www.cjb.net . on cjb.net you will be able to hide your IP Stealing address (which you
|
|
should do). In the blank box, write down what website you would like to have:
|
|
|
|
EXAMPLE: http://this-is-my-ip-stealing-site.cjb.net
|
|
|
|
This is FREE.
|
|
|
|
Once you push the Register it button, it will take you to another page, where you give your
|
|
actual website that it is going to cloak for you. When it asks for your real website, put in
|
|
http://your ip address:666 . You need to Copy your IP address that you took from your Satanic IP
|
|
Stealer program, and paste it in the box, then the :666 .
|
|
|
|
EXAMPLE: http://56.343.234.32:666
|
|
|
|
The rest of the webpage you are signing up for, just select NO for everything, when it asks for
|
|
your email address, just give them a bunch of bullshit like: afdaufdafyduafydiafyduyi@yahoo.com.
|
|
|
|
Then type in your password, and register it.
|
|
|
|
It should then take you to another webpage that says "Ok here is your link, congratulations".
|
|
Click on the link, then look at the Satanic IP Stealer program, your IP address should pop up in
|
|
the bottom of the box. If it doesn't, then you are an idiot and you need to redo everything.
|
|
|
|
Now, copy the link it gave you, and save it somewhere.
|
|
---------
|
|
The Attack
|
|
|
|
Ok, now lets get to your Trojan. There should be a program that came with the Trojan that you
|
|
have called "Server.exe". DO NOT OPEN IT. Right click on server.exe, and rename it to
|
|
"myprogram.exe" or something like that.
|
|
|
|
Now, go into a chat room on Yahoo. Find some idiot that want to download the program. You do this
|
|
by telling them its a Game that you programmed, or a self extracting exe that is filled with porn
|
|
pictures.
|
|
|
|
First, you give them the Link that you chose from cjb.net. When they click the link, their IP
|
|
Address will show up on your Satanic IP Stealer program. They will then inform you that the page
|
|
did not load. Say something like "oh, I'm sorry, my web host is down, I'll just send the program
|
|
to you".
|
|
|
|
Now, on the message box, click the "Send File" button. Find the Server that your renamed. Now,
|
|
send them the file.
|
|
|
|
When they recieve the file, they will open it, and then you can connect to their IP Address that
|
|
you got when they clicked on the link.
|
|
|
|
Like I said, I am not explaining how to use the trojan, so figure it out yourself. Have Fun.
|
|
--------
|
|
Covering Your Tracks
|
|
|
|
When you do things like this, there is always a chance of getting caught, so it is logical to
|
|
cover your tracks so it is harder for anybody to catch you.
|
|
|
|
When you are in their computer, goto C:\Program Files\Yahoo!\Messenger\StoredIM , and delete
|
|
EVERYTHING in that folder, this will delete your entire convorsation with the victim, that way he
|
|
can never prove it was you.
|
|
|
|
goto C:\Program Files\Yahoo!\Messenger\Profiles\victims_username\Archive\Messages and delete all
|
|
the files in the folder.
|
|
|
|
goto C:\Program Files\Yahoo!\Messenger\Profiles\victims_username\Archive\Conferences and delete
|
|
all the subdirectorys in the folder
|
|
|
|
goto C:\My Documents\victims_username\receive , find the program you send the victim, and delete
|
|
it.
|
|
|
|
When you are done in the victims comptuer, on your trojan, click on the "Kill Server" button.
|
|
this will delete the server compleatly off of the victims computer.
|
|
---------
|
|
Hope you enjoyed the Information that is for informational perposes only.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|