Showing posts with label Hacking Software. Show all posts
Showing posts with label Hacking Software. Show all posts

Tuesday, December 20, 2011

Hack Computer With Ardamax Keylogger v3.8.9


Hello, today we are going learn that how to hack any Computer with Ardamax Keylogger v3.8.9? I said hack any Computer it means we can get screenshots, webcam images, chat logs, web logs etc so it is not only hacking email accounts but also getting information about your victim's activities. So for this definitely we need Ardamax Keylogger, first Download it.

1. Now after download it's time to install it, open "Ardamax Keylogger v3.8.9.exe" from the downloaded file. Click "I Agree" button.


2. After clicking "I Agree" button, click "Next" button.


3. Then click on "Install" button.


4. Then installation will start after clicking "Next" button in the previous step after automatic installation just uncheck one box and click "Finish" as shown in picture.


5. After installation you'll see a new icon in the taskbar just like a notepad and pen. So now we'll setup this keylogger with some manual settings. Right click on that icon and click on "Remote Installation..." And you can also see another option "Enter registration key..." click on it to make it register to work properly, use this info to register:

Name: Popescu Marian
Serial: 083A-E649-5E15


6. A window will appear just click on "Next" then you'll see a window with some options leave default just take a look at check box with option of appending means if you want to merge with or bind this keylogger virus (trojan) with any file like document, picture or even video file then you have to check the box and click Browse button to browse your requested file, we are not appending in the tutorial but it is up to you.


7. Leave all option default these are perfect options that we can use and click on "Next >" button.


8. Then you'll see window where you can setup a password for this trojan or virus, again it is up to you not really needed but good to have. If you want to setup a password then click on "Enable" button and follow steps and click on "Next >" button.


9. After that you can set combination of keys for your trojan it is recommended to change it because "Ctrl + Shift + Alt + H" are default combination of keys and don't check the box about "Self  Destruct Date" if you want to receive logs from your victims for unknown time or infinite time. Then click "Next >"


10. Then a new window will appear check the box "Send logs every" and set the time about getting logs, delivery method i prefer "Email" & "FTP" in this tutorial i'm using "Email" it works, set the log format to "HTML (web page)", and then check what you want to receive to your email or ftp account like screenshots, keystroke logs, chat logs etc. Next option is up to you that you can set the limit of data size to get logs but i recommend to uncheck this and then click "Next >" button.


11. Then you have to put your email account information just follow the picture remember to click on "Test" button to see it is working or not if you get error about connection refusing to something like that then just click on arrow button next to "Security" and select "None" instead of "SSL". When you type of email address it will automatically insert all other fields except password field.


12. Just leave all settings as default but if you want to edit then select anything that you wan to set and click on "Settings..." and after setting just click "OK" button and then click "Next >" button.


13. Now it will ask you about screenshots settings just click "Next >" or if you want to set it manually then do it what are you waiting for, then click "Next >" button.


14. Then again it will ask about images taken from webcam just leave it default or set it as you want then click "Next >" button.


15. Then it will ask you about destination where you want to save it in your PC and you can also change default icon just click on "Change icon..." button and select any icon and click "OK" button then click "Next >" button.


16. At last just click on "Finish" button and then a pop-up will appear as show in picture just click "OK". And it will open the folder where you saved your trojan or virus just send that virus to any victim and start receiving keystroke logs, chat logs, screenshots, webcam images etc to your email which is used in making virus or trojan.


Still you have any question or trouble about this tutorial then reply to this post.

Friday, August 12, 2011

Making a Trojan Virus in ProRat v1.9

Here i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

1. First of all Download ProRat v1.9. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "InfoTech4pc".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the Create button in the bottom. Choose Create ProRat Server.


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General Settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.


9. After this, press Create Server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.

  
13. Below is an image of what the hacker would see if he choose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.