Popular Post

Popular Posts

Recent post

Archive for 2014

Download Xtreme Rar From Here

Xtreme Rat 3.6

HOW TO DOWNLOAD AND INSTALL :-
For downloading check the download link

Click To Download !

HOW to install :
1:First install regular maxkeylogger (serial is provided in readme text)
2:Then open the maxkeylogger and you are done
3:Then put your password (desired)
4:Then remember this hotkey combination ( ALT+CTRL+SHIFT+Z)
5:Then when ever you want to see what your childeren or anybody has done in computer or fb you will press the keys this will open to you

6:Now put your password back and  this will open to you
7:Now there you are now you can see the logs of keystrokes what your child has open in web or he/she was watching pornographic content you will always in touch with her/him
most important you have now proof of what he has done :)

In this article i am going to show you how we can hack remote computers using DARKCOMET RAT. Here, some steps are same as Extreme RAT tutorial . But i will repeat all the steps to avoid confusion. So lets move on.

Things you require

1) DARK-COMET RAT

This is the RAT you are going to use. You can get it from Here

2) No-ip.biz  account

As our IP-Address is dynamic(in general), we need to make it static.

3) DUC client

We can automatically update our dynamic IP-Adress, by installing DUC client.

4) VPN (If you are behind a router)

We must enable our router to allow us to connect to a remote PC. So we need to port forward.
Instead of port forwarding we use a VPN(Virtual Private Network).
You can use Proxpn.

Procedure:

Step 1:

First you need to create an account in www.no-ip.com

Step 2:

After creating an account, login with your account and create a host. You can do this by just following the steps.

Goto this link, and login. Then follow the steps as shown in the picture.


Finally click “Create Host”.

Step 3: Setting up your server.

First install Dark-Comet RAT on your PC and run it. It opens a window as shown below.


Now click on the + button which is at left bottom corner as shown below.


 It opens a small window showing you the port number. Click on “listen” button.


Then it disappears, don’t click the “listen” button again. Now click on “edit server” button at the bottom of the window as shown in the figure. 


It opens a new window with huge amount of options. First lets move on to the main settings. You can set a password to use when listening connections. You can see the default password by checking “security password” and “show chars” in the fillowing picture.


Now we need to set up our “network settings”. Clearly follow the steps here. You need to give your domain name you got from no-ip.com
It looks like yourdomain.no-ip.biz


 We came to the funniest part of our RAT setup. Here you can choose your icon. DarkComet is providing us some beautiful icon. So that our victim can easily believe us. Just follow steps  shown in the figure. It is self explanatory.





You can bind your server file with a PDF or Image. So when the victim clicks it, it opens the PDF file and the victim will not be able to suspect you. You can follow the steps as shown in the figure.


Finally click on “Build Server” button. It creates a new server file in the same directory where your dark-comet files are stored.

You are done. your server file looks like this. 


Now give your server file to your vicyim by any means. When  he clicks the server file, he will be connected to your computer. 


Now you can do anything you want. You can see him with his web cam, downloading files and many more. Just move around the options and play with him. I put two screenshots of how it looks like when you get access to his computer.


Using RATs on remote systems without their permission is illegal. This article is for educational purpose only. Dont do anything illegal. I will not be held responsible for that.

Download Dark Comet From Here

In
 my previous article, i have given a small introduction to keyloggers. You can read it from here
In this article i am going to show you how you can monitor your computer using  REFOG keylogger.

Requirements:

      REFOG keylogger

Concept:

This is a software you have to install on your computer. It sends all the keystrokes,screenshots to your mail box and thus you can easily hack  anyone's account by simply installing this keylogger.

Procedure:

First download keylogger and install it.
You can download it from here.
After installing follow the steps as shown in the screen shots.






Here enter the following information

              5-minutes
Email - your email address.
Account password - Your email password
Email-sender-Your email address.

and finally click test.



Now it sends an email to your email id to test whether it is working or not.


After clicking "OK" verify your email id. you shoul receive an email from it.
Then follow the steps again.


This is the important window. Here you can specify your HOT KEY to see the logs on your system when you dont have internet.


And finally click finish.
Now if you want to see your logs, just press the HOT KEY you have specified in the above steps.
It opens a window where you can see all the functions of your keylogger.
I kept a screenshot of KEYSTROKE logging here..


You can install this keylogger on your friend's system and can hack his accounts.
The disadvantage is you should have physical access to your friend's computer.
I will write an article on remote installation keylogger soon.


Hope you liked it.If you have any doubts or suggestions leave a comment.
Symptoms of a trojan:


Unusual behaviour of the system is a mere indication of a Trojan attack!!!
• Programs starting and running without the initiation of the User.
• Opening or Closing of CD-ROM drawers
• Wallpaper, background, or screen saver settings changing by themselves
• Screen display flipping upside down
• Browser program opening strange or unexpected websites.

All the above actions seem like a ghost controlling your system!!!!
The actions clearly indicate that you are under Trojan attack!

Concept behind Detecting Trojans:

The first and foremost thing you have to do is to check the applications which are making network connections with other computers. One of those applications will be a process started by the Server Trojan.

METHOD 1:


Detecting trojans using" netstat" command


An effective method to detect trojans is by using “netstat” command.


Step1: Go to Start>run and type cmd ( to open command prompt)

Step2: Go to C drive and type netstat
It displays all the Active Connections.

Now Type the command netstat –ano
It displays all the present TCP/IP and UDP ports that are being used.

The trojan could be one of the ESTABLISHED conections. But not all the ESTABLISHED connections are trojans.

Step 3: Open task manager.

(This can be done by right-clicking on task bar and start task manager)
Step 4:


Go to view-->select columns

Check the process Identifier and click ok.


Step 5: Cross check the PIDs of ESTABLISHED connections with the PIDs shown on task manager to know the name of the program or application running. For example PID 5004 isTeamViewer.exe (as shown in the image)

Step6: Whenever you find a suspicious program, copy the name and paste it in the search box of spywareguide.com
For example, one of the programs could be Backdoor.Alvgus.a.exe. Copy it and paste it in the search box of spywareguide.com
Click on it and it displays its properties…..


How To Kill A Program??


Well, you have identified a trojan. Now you have to kill it. You can kill the process using pskill.
And now you can kill the program using pskill.
You can download pskill from here. 
Store the pskill.exe application on your C drive. And now you can kill the particular process using the command C:\>pskill 5004 (PID of the program).

METHOD 2: 


Detecting and removing Trojans Using  TCPView:


If you find it difficult to do all the above stuff, just go through this method.
TCPView is a Windows program that will show you detailed listings of all TCP and UDP end points on your system, including the local and remote addresses and state of TCP connections. you can download it from here.
When you start TCPView it will enumerate all active TCP and UDP endpoints, resolving all IP addresses to their domain name versions.
Endpoints that change state from one update to the next are highlighted in yellow;
those that are deleted are shown in red, and new endpoints are shown in green.
You can right-click on active connections and check the properties.

Once you get hold of the Trojan application, you can Kill the active connection and the running process and then delete the physical application file.
This will make you recover from the attack of Trojan.


How to prevent a Trojan Attack??


The key to preventing Trojans and backdoors from being installed on a system is to not to install applications downloaded from the Internet or open Email attachments from parties you don’t know.
Most commercial antivirus programs have Anti-Trojan capabilities as well as spyware detection and removal functionality.
These tools can automatically scan hard drives on startup to detect backdoor and Trojan programs before they can cause damage. It’s important to use commercial applications to clean a system.
Also use Malwarebytes Anti-Malware to protect your computer from all kinds of viruses and trojans. You can download it from here.

NOTE: Never ever download trojans and RATs from third party websites. Always use Trojans from their official websites only.

About the author: This is a guest post by ANUSHA MANNE who is interested in new technologies and wants to share knowledge with my blog readers. Usually writes articles related to latest technologies at Techie Talk


Hope you enjoyed the article, feel free to leave your comments for further clarifications anddoubts.

- Copyright © 2013 Ðárk Ðémõñ - Powered by ��rk ��m�� - Distributed By Deviil Dmc - Designed by Deviil Dmc