Hack any computer

Posted: Tuesday, 20 August 2013 by INCOGNITO in Labels:
0

Now this time I am posting a tutorial about one of the most famous RAT program ProRAT. 1. First download a ProRAT program, (I will soon be updating this post by adding download link for proRAT) Extract all datas intothe folder. 2. You will got a window something like this. 3. Now click on create button. 4. click on the "Create ProRATserver342kbayt" 5. Now in "PC connective Notification Network". put your ownIP address. You can find your IP address here Now in "Mail notification" put your ownemail IDhope you know this(joking :-p). This column is used to connect ProRAT server to you computer and and send you email of the logs that itskeyloggerwill record. 6. Now click on the "Create server" a pop up window would appear stating "The serverhas been created" the server will be created in the default directory i.e. in the folder were proRAT is kept. 7.Not everyone would be willing to click on anything with .exe extension so, what we needto do is to hide the server.exe file. Best way is to bind it with another file such as some mp3 or some jpeg for which victim may fall for. Now click on the bind server with file option, click on select file browse and choose the file you want to bind server with click on bind. 8. Server file when created looks suspious, you can also change the server icon just go to server icon and choose the icon you want from the entire collection. Now, you need to send this file to your victim, here you need some social engineering. First off all make aRARarchive for server as you can not send .exe file via email due to policies of service providers. Bind the file with anyfavorite songor picture of victim or to anythingthat victim will be compiled to click on and once he clicked he isall yours. PROs and CONS ProRAT is a complete package, it is a RAT, a keylogger, binder etc. ProRAT has been around for quite a long time. As its around for quite a long time it can be detected by anti viruses during scan time but isundetectable during run time. Hope you guys liked this tutorial please leave comment for any quires and suggestions. by this method you can also hack any email or social networking accounts.

0 comments: