9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server"
will be created. Rename this file to something describing the picture. A
hacker could also put it up as a torrent pretending it is something
else, like the latest game that just came out so he could get people to
download it.
Very important: Do not open the "binded_server" file on your system.
10.
You can send this trojan server via email, pendrive or if you have
physical access to the system, go and run the file. You can not send
this file via email as "server.exe", because it will be detected as
trojan or virus. Password protect this file with ZIP and then email it.
Once your victim download this ZIP file, ask him to unlock it using ZIP
password. When the victim will double click on the file, he will be in
your control.
11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.
Once
the victim runs the server on his computer, the trojan will be
installed onto his computer in the background. The hacker would then get
a message telling him that the victim was infected. He would then
connect to his computer by typing in his IP address, port and clicking
Connect. He will be asked for the password that he made when he created
the server. Once he types it in, he will be connected to the victims
computer and have full control over it.
No comments:
Post a Comment