You are on page 1of 7

K-K-Ðs GUIDE TO

=================
USING TROJANS
===========

Disclaimer
==========
Ok im only gonna tell you this once (lets face it i dount want to just every
txt file these days has one) its not my fault
for any damage caused by the information in this txt file if you those to do
any of the activities then it your own fault.
Contents
========
1: Whats a trojan?
2: Why would any one want to use them?
3: do"s and dounts
4: Using Netbus
5: Getting IPs
6: Im in now what?
7: Using SubSeven
8: Ports and ports scanning
9: Using BO2K
10:The pigs are at my door!

Whats a trojan?
===============
Ok well a trojan is a peice of software used to hack into brake into and spy
on some ones computer there are normaly two main
parts of a trojan a server and a client the server is a program that needs
to be installed on some ones computer in order for
you to hack them and a client is the part you control/hack the computer with
so if you think about it a trojan is like a
bugging transmitter it lets you spy on some activitys while there on the
internet.
Why would any one want to use a trojan?
=======================================
Well there are many reasons realy maybe you want to snoop round some ones
computer just to see whats on there or maybe you
want to keep tabs on some one to either see if there talking about you
behind you back or maybe you just want to have some
fun and scare some one shitless.
Do"s and dounts
================
Dount infect people you dount know very well for the simple reason there dad
could be a pig and have lots of connections
or he could be a programmer or something and they know how to trace you
dount just delete random file i mean if you do this
your realy just BORING i mean for one you wount be able to watch them second
if they found out it was you,you will get done
for criminal damage the only time you start to delete is when you realy HATE
them.

A Beginners guide to
======================
NetBus
========
YOU WILL NEED
==============
NetBus 1.7
a computer connect to the net
a chat program iCq MSN MESSENGER YaHoo! messenger
Victims
=======
Ok lets say you realy dount like some one and you have there hotmail/yahoo
email address ok now make a new hotmail/yahoo
account (just for a bit of cover) add them gain there just talk to them get
to know there intrests then asuming you have
NetBus there will be a progam called "Patch.exe" ok DOUNT open it this
little program is the server I.E the program that
must be running on the victims computer for you to hack them. So you need to
send it to them lets say there intrest is
Monster trucks rename the server Monster trucks game or monster truck rally!
i mean its not to hard but the victim has to be
attracted to this file enough for them to accept it
Getting IPs
===========
Ok so whats an IP address IP stands for Internet Proticol an IP address
looks some thing like this 217.32.246.75 it a number
that identifies one computer from another (your ip address changes every
time you come online) the way you get an IP address
is from the netstat -n command from MS-DOS. Before you send them the server
file go to MS-DOS and type in Netstat -n
and it should come up with some thing like this
C:\Windows>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 127.0.0.1:1539 64.4.13.32:1863 ESTABLISHED
TCP 127.0.0.1:1113 208.185.211.71:80 ESTABLISHED
TCP 127.0.0.1:1122 217.32.246.75:80 ESTABLISHED
C:\Windows>
It should look like that any we give or take a few IPs now send them the
server once they have accepted the server file
type in Netstat -n again and some thing like this should come up
C:\Windows>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 127.0.0.1:1539 64.4.13.32:1863 ESTABLISHED
TCP 127.0.0.1:1113 208.185.211.71:80 ESTABLISHED
TCP 127.0.0.1:1122 217.32.246.75:80 ESTABLISHED
TCP 127.0.0.1:2134 64.254.113.45:1302 ESTABLISHED (Ok this
is there IP address)
you can tell because it is a new active connection it wasnt there before.
ok now you have there IP put it into NetBus (port 12345) and hit connect
hopefully if you have done it right it should say
some thing like "Connect NetBus Version 70
Im on now what?
================
Well your now in there computer just look at some of the options im mean
come on
Open CD-ROM dive Close CD-ROM drive
Show images
Swap mouse bottons
Run programs
Send messages
Screendump(see whats on there screen)
Get computers info
Regedit
Play run sounds
Shut down computers
Active windows
Control mouse
Keylogger(see what there typing on there keyboard)
and of course File manager
Just try not to let them know you in there get what i mean or they will
catch on to you:-)
ok now you can use NetBus lets learn some thing a little harder
SubSeven2.1.3 Bonus by mobman

A Beginners guide to using


============================
SubSeven
==========

Ok now there a 3 parts to SubSeven a client a server and an edit server now
this is the good part of SubSeven insted of
some one telling you what port you should run on what the server icon should
look like and how the server should start up
you can choose your self ok open Edit server now it will first say at the
top server select the server then start up
method(s) if i wure you i would click all of them expet Win.ini then victim
name leave it blank here we go E MAIL
NOTIFY! this realy is a good option type in your email addres where it says
Notify to then server if you use HOTMAIL
the server will be MAIL.HOTMAIL.COM if you use Yahoo! it will be
mx1.yahoo.com and here are some other servers.
hotmail.com -> mail.hotmail.com
yahoo.com -> mx1.yahoo.com
hushmail.com -> www.hushmail.com
rocketmail.com -> mta1.rocketmail.com
altavista.net -> spool.globecomm.net
angelfire.com -> mta1-mail.angelfire.com
juno.com -> a.mx.juno.com
mailcity.com -> mta5-mail.mailcity.com
Ok now the startup port now it will have the defaut port in there 27374 you
can leave it at that there no problem with that
but you can change it to some thing like 1234 or 124356 what ever you want
then server password it is a good idia to use this
so people carnt steal your victims then heres a good one enable fake error
message this lets you make an error messager
so when the victim opens it the will see an error like "COULD NOT OPEN FILE"
but use what ever you want then in the top
right change server icon! this is realy good for making the server look like
games and things then save your server and now
your ready to send the server to some one (do the same thing as you did with
NetBus MS-DOS netstat -n)then hit connect it
will say some thing like "Connected 8:21pm Version 2.1.3 Bonus". here are
just some of the options on SubSeven
Ip scanner
Computer info
Home info
server setup
keylogger
send keys
chat with victim
THE MATRIX.... :-) this is a gr8 option ill leave you to find out what it
does....
Spy (spy on convos)
iCq TAKE OVER!
password reciver
REDEDIT
App processer
file manager
windows manager
process manager
webcam spy
and LOADS more
Ports and port scanning
========================
ok now once you have a port scanner you can scan random IPs for open ports
like 27374 and 12345:-) providing they dount have
password on them here are a few trojan ports worth scanning
Ports| trojans|
----- --------
31, Master Paradise
121, BO jammerkillahV
456, HackersParadise
555, Phase Zero
666, Attack FTP
001, Silencer
1001, Silencer
1001, WebEx
1010, Doly Trojan 1.30 (Subm.Cronco)
1011, Doly Trojan 1.1+1.2
1015, Doly Trojan 1.5 (Subm.Cronco)
1033, Netspy
1042, Bla1.1
1170, Streaming Audio Trojan
1207, SoftWar
27374,SubSeven
1245, Vodoo
1269, Maverick's Matrix
1492, FTP99CMP
1509, PsyberStreamingServer Nikhil G
1600, Shiva Burka
1807, SpySender
1981, ShockRave
1999, Backdoor
1999, Transcout 1.1 + 1.2
2001, DerSpaeher 3
2001, TrojanCow
2023, Pass Ripper,,,
2140, The Invasor Nikhil G.
2283, HVL Rat5
2565, Striker
2583, Wincrash2
2801, Phineas Nikhil G
3791, Total Eclypse (FTP)
4567, FileNail Danny
4950, IcqTrojan
4950, IcqTrojen
5000, Socket23
5011, OOTLT
031, NetMetro1.0
5400, BladeRunner,,,
5400, BackConstruction1.2
5521, IllusionMailer
5550, XTCP 2.0 + 2.01
5569, RoboHack
5742, Wincrash
6400, The tHing
6669, Vampire 1.0
6670, Deep Throat
6883, DeltaSource (DarkStar)
6912, Shitheep
6939, Indoctrination
7306, NetMonitor
7789, iCkiller
9872, PortalOfDoom
9875, Portal of Doom
9989, iNi-Killer
9989, InIkiller
10607, Coma Danny
11000, SennaSpyTrojans
11223, ProgenicTrojan
12076, Gjamer
12223, Hack´99 KeyLogger
12346, NetBus 1.x (avoiding Netbuster)
12701, Eclipse 2000
16969, Priotrity
20000, Millenium
20034, NetBus Pro
20203, Logged!
A Beginners guide to using
============================
BO2K
======

BO2K or Back Orifice 2000 is one of the most POWERFULL trojans/admin tools
out there well for the microsoft environment
its not just a trojan thought its also a remote network administration tool
so you can use it to hack and if ur an admin
it can make your life a bit eisier i belive if you can master this trojan
you can master any trojan this is realy only for
advanced users (as it was first made for linux) its default TCP port is
18006 if its UDPIO the port will be 54320.
Make your server
=================
Like SubSeven there is an edit server this is called bo2kcfg open it it will
ask you for ports and passwords just use the
default port 18006 for TCP networking then it will go onto BO2K server
configuration select your server (BO2K) and insert
the BO_PEEP plugin this comes in the zip file adding this plugin will add
the vid streem option and hijack option BO_PEEP
also lets the server communicate better with the client then go to the
stealth sub folder and enable the server to start up
on the victims startup and you can change some default ports if you want but
its not a good idia another good plugin to have
is Rattler v10 this send an email when the user is online but you need to
configure this from the client. again re-name
the server and then get the IP from netstat -n now heres some thing
differnet open bo2kgui this is the client then click the
little computer in the bottom left it will come up with edit server settings
name of server well say you named the server
my pic put my pic in there the server address if there ip is 123.456.78.910
and ur port is 18006 put in there
123.456.78.910:18006 then click ok then connect...
it will say something like <BO2K BACK ORIFICE 1.0> in the server responce
section now this is pritty hard to master lets say
you wanna log the victims key strokes you go to keylogging log keystrokes
then it will say diskfile this is where you wanna
log the key strokes to type in a path like
C:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} some where
they
will never look then wait for around 20mins then go to stop keylogging and
send the command then to view keystroke logs
C:\windows\system\catroot\{127D0A1D-4EF2-11D1-8608-00C04FC295EE} then send
command it will the let you view the logs in the
server responce section just mess around with it you will get it its one of
those trojan that you need to work out your self
theres just so many commands for me to go frew them all but heres some
options
Keylogging
M$ networking
TCP\IP
network mapping
file manager
REGEIDT
and more and belive me there is loads more also you can infect networks with
this trojan but its not a good idia because
an admin will spot it right away unless your an admin your self and want to
use it to well admin things....:-)
What if the pigs turn up at your door
=====================================
Well as long as it your first offence and you didnt FUCK SOME ONES COMPUTER
UP just admit that you did it becuase they will
be able to ask your ISP and the can trace you any time any where and also it
will give the police the idia that your not
realy that bad you have admitted it and your ready to face what you did(they
wount do any thing unless you fucked up some ones
computer)
Any way hope this has helped some one

BY
K-K-Ð
--------------------------------------------------------------------------------
---------------------------------------------

You might also like