Just go through the Part 1 which includes the basics of Trojan Click here. This tutorial is about configuring and using a trojan. There are many trojans available on the internet for free. Some popular ones are Beast, Pro Rat, Netbus, Back Orifice, Girlfriend, Sub 7. I will be using Pro Rat in this tutorial.
Requirements
1. Prorat- Click here to download Trojan Prorat.
2. Hostname – Your IP address would probably be dynamic that it keeps changing every time you disconnect and reconnect. You need a hostname which always automatically keep pointing to your changing IP.
Follow these steps -:
1. Log On to www.no-ip.com and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.
3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.
4. Let’s check whether your IP has been associated with the chosen hostname or not. Go to command prompt and type ‘ping
Tutorial for configuring Trojan.
- Open prorat.exe that you have downloaded.
- Click on Create and then Create ProRat Server
- Enter your host name in the ProRat Notification field as shown. Uncheck all other options.
- Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.
- Finally click on create server and now its ready to be sent to victim. Once victim installs it, it would automatically disable antivirus/firewall.
Modes of sending
You must be thinking of sending this server.exe to victim through an email as an attachment but unfortunately you cant do so. The good option is to upload it on any uploading site like mediafire.com and give downloading link to victim.
What after victim has run the server part ?
1
2
Note: If you know victim is online and still its not listening to any connections. Trace victim’s IP,enter in IP field and hit connect. But its gonna work only if he is not behind any network and directly connected to internet. If you dont know how to trace IP, mention in comments.
What after successful connection ? After you have managed to connect to victim’s machine. There are numberless interesting things to do. I leave this part on you. Have Fun.
How to make it undetectable from antivirus ?
Though there isn’t any hard and fast way to make it fully undetectable from all antiviruses. The real way to do it is modify the source code of open source trojans available. Its very challenging job. There are many crypters which claim to make it undetectable but unfortunately hardly one out every hundred works. I would try to write next article on the same.
Contermeasure against Trojans –
The obvious coutermeasure against trojans is that do not accept downloading links blindly. Keep your antivirus up to date.
Detecting and removing Trojan
Though trojan once installed is very hard to remove. It would hide from the Task Manager. Install Process Explorer and it would hopefully show you all process running including trojan. Kill the process and remove it. One good thing is to carefully check the open ports and services running through ‘
Feel free to ask the queries in comments 🙂
Comments
0 comments