Vous êtes sur la page 1sur 4

How to use Trojan

Horses
This is a "How to.." guide explaining the best and more useful way of using tr
oyan horses.I won't teach how to use trojan horses cause their options are easy
to use and don't
need to be explained.I'll talk about things different from deleting someone's
hard drive there are
MUCH better ways to make his life impossible to live in.Yeah I'll talk about t
his in this guide.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
I hope you know what trojan horse is if you don't know I'll explain you what is
trojan horse
*Note for newbies
A trojan horse is
An unauthorized program contained within a legitimate program.
This unauthorized program performs functions
unknown (and probably unwanted) by the user.
A legitimate program that has been altered by the placement of
unauthorized code within it; this code performs
functions unknown (and probably unwanted) by the user.
Any program that appears to perform a desirable and necessary function but that
(because of unauthorized code within it that is unknown to the user) performs
functions unknown (and probably unwanted) by the user.
********************************************************************************
**********
So you now have some definitions what trojan horse is I hope you understand them
.So first of all
you must have all trojans clients cause you don't know what trojan client you'll
need sometime.
You must have both the new and old trojans clients.You must know all trojans por
ts so you can see
with which one is your victim infected here I'll post some trojans ports.
*Trojan ports
Netbus(Default)-12345 TCP
Back Orifice (Default)-31337 UDP
WinCrash 1.03-5742 TCP
WinCrash 2.0-2583 TCP
Deep Throat-2140 TCP
Silencer-1001 TCP
Sockets de Troie-30303 TCP
Devil-65000 TCP
Girlfriend-21554 TCP
Millenium-20001 TCP
Masters Paradise-31 TCP
Phineas-2801 UDP
BackDoor-1999 TCP
Back Orifice-31336 UDP
Evil FTP-23456 TCP
Executor and HTTP-80 TCP
FTP-21 TCP
********************************************************************************
**********
You see your victim is infected with one of them.Now It depends on the trojan th
e victim is
infected but the most trojans
have the common functions like start a keylogger,FTP access full downloading and
uploading, set

a password on the victims computer so only you can use it,even change the port o
f the machine.
Of course there're many other options but I'll talk about this one now.
So you see the victim is infected with Netsphere cause port 30100 is open(
this is just an
example the victim can be infected with Sub7,Netbus,BOK200,Master Paradise and a
ny other
trojan but this what I'll talk about is for EVERY trojan horse Remote Access of
course
Now you must find Netsphere's client on your hard drive if you don't have it dow
nload it
from the net. Every site talking about hacking and trojans have it.Let's suppose
you found the trojan client (I advice you to have all the trojans clients on your hard drive so y
ou don't have to
look for them).
Now simple connect to the victim and the first thing you MUST do if you want the
victum only for
you is to set a password on the victim's computer and change the port. Of course
is letting you to
do this. Most of the trojans let you to do such things. Now you should check for
cached passwords
cause many people are saving their passwords. Now the important part the only on
e thing some
people like and they're using the trojans- The Victim's Hard Drive. You can find
a lot of useful
information there cause this is someone's computer everything about him/her is t
here waiting
for you to get it.
DON'T delete anything. THis is the most stupid thing but EVERYONE is doing it.
I understand you
want to destroy your victim but there are MUCH MORE BETTER ways to do this and b
elieve me
there are more effective. Everyone can deletes someone hard drive but this is no
t interesting.You
may find MANY interesting things on the victim's hard drive.
So you're on their hard drive. Now you MUST look you any anti-virus or trojan s
canner on their
drive.I hope you know the most trojan and virus scanners. Norton AntiVirus,The C
leaner,LockDown
F-prot,AntiViral Toolkit,Avast 32 etc.
Now search their drive in the program files directory for such tools.Of course t
here are many other
but you'll see the names in the directory and decide if this you find is somethi
ng like the above
things. Now let's suppose you found something on their drive. Go there and delet
e only some DAT
DLL or EXE files. This will make the program not working but the other files wil
l be still there. So
the victim won't think someone deletes anything. He'll just reinstall the progra
m and then install it
again. Then you'll again delete it and again...... This is not good cause the vi
ctim can always install
the program scan his drive and then connect to the net. He'll clean the hard dri
ve and then you won't
be able to connect to him.
You may try to get everything about him in one evening or morning only.Then he
may scan and
clean the trojan but you'll have everything you want about the victim.

*Note
Believe me when someone is infected is he or she had a trojan cleaner they'll be
clean. They are
still infected that means that they're a real newbies and don't know what trojan
horse is. I'll advice
you to use THE NEWEST trojan that are not detectable by the virus and trojan sca
nners.
********************************************************************************
**********
Most people are talking via IRC (Internet Relay Chat).But if they give the opti
on to the IRC client
to log everything this will be useful for you.
*Note
If the victim didn't give the client option to log everything you can find him o
n IRC and meet him
then talk a little and then ask him to do this.But don't forget to tell him what
he'll win if he do this.
This is vEry important.Tell him that he'll be able to read then all of his logs
with his friends.Now
he'll do it.
********************************************************************************
**********
Now go in the MIRC\logs directory on the victims hard drive (he might change the
directory but
you'll find it I'm sure). There you'll find all of this conversations with his f
riends now download all
logs in the directory.The when you're off-line you'll read them and see who are
the victims best
friends.See if they told him important and secret things.If you find something g
o on IRC and find
his friend and tell all the things you know to him/her.They'll ask you who told
these secret things.
Tell them it was their "friend" your victum.Haha I think this is BETTER than del
eting files.But
there's more. Now you must see his other friends on ICQ.GO in the ICQ directory
in NEwDB directory and download all .dat files there's his password and all the things he talked
with his friends.
Take the password and his contact list and start talking stupid things to his fr
iends. After this you'll
leave you victim without friends. This is better than deleting I told you.
Now go and search for something interesting on his hard-drive. There're a lo
t of people who writes their passwords on their computer web page passwords,e-mail passwords and ot
her. Search
for something like IMPORTANT directory or something like that. There you'll find
interesting things
IF you find password hack his web page and e-mail address. This will destroy him
believe me.
Well there are the things which are better then deleting everything believe me
when someone
loose all of his friends,his e-mail address,his web page and important informati
on on his hard-drive
YOU ARE COMPLETELY DESTROYED.
That's the guide but there'll me more and more just keep reading if you like the
guide or you have
any questions about it,or you want some other guides you can contact me at:

dancho@schoolsucks.com
Bye
you
not
ing

and I hope this guide will be useful for you.As I told you I'm only telling
how to do this
to do it. I don't take any responsibility about anything happened after read
this guide.

Author: tH3 m4n!4c


contact me at : dancho@schoolsucks.com

Vous aimerez peut-être aussi