meta expr:content='data:blog.pageTitle' property='og:title'/>

Saturday, 1 December 2012

How To Hack Someone's Computer Easily

ProRat:
           ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server. ProRat opens a port on the computer which allows the client to perform numerous operations on the server (the machine being controlled). ProRat is available in a free version, and a paid version. In the free version, ProRat cannot connect to users over wide area networks (WANs), only over LANs (Local Area Networks). ProRat is known for its server to be almost impossible to remove without up-to-date antivirus software.



The Method :
Things To Know Before Trying :
  • The Method Is Complicated But If You Are Successful With It Your A Hacker!
  • The Program Is Very Effective And Can Destroy Others Pc In Seconds
  • The Program Will Be Detected As A Threat By Any Antivirus So You Must Disable It Before Doing So.
  • Dont Use The Method For Fun Only Use It Personal Matters !!
  • The Method Is Not For Noobs!

The Method :
1) Download Prorat By Clicking Here . The Password For Rar Is "pro"
2) Open Prorat And Click On The Create Button Choose Create ProRat Server 342 Kbyat)
3) Then Put In Your Ip Address In The So The Server Could Connect To You.If You Dont Know Your Own Ip Address Click On The Arrow Near The Box And it Will Be Filled Automatically Then Below Put Your Fake Email So That When And  If A Victim Gets Infected It Will Send You A Message Via Email.

4)Now Open General settings.This Tab Is The Most Important Tab In The Whole Program. In The Check Boxes ,We Will Choose The Server Port The Program Will Connect Through The Password You Will Be Asked To Enter When The Victim Is Infected And You Wish To Connect With Them, And The Victim Name. As You Can See ProRat Has The Ability The Disable The Windows Firewall And Hide Itself From Being Displayed In The Task Manager


5) Click On The Bind With File Button To Continue.Here You Will Have The Option To Bind The Trojan Server File With Another File. Remember A Trojan Can Only Be Executed If A Human Runs It.So By Binging It With A Legitimate File Like a Text Document Or Game Or Even Better A Setup File Of A Program ,The Changes Of Someone Clicking It go Up.Check the Bind Option And Select A File To Bind It To(This Is Similar To Keylogging).A Good Suggestion Is A Picture Or An Ordinary Text Document Because That Is A Small File And It's Easier To Send To People Via Facebook | Email | etc



6) Click on the Server Extensions Button To Continue. Here You Choose What Kind Of Server File To Generate. I Prefer Using .exe Files, Because It Is Cryptable And Has Icon Support, But Exe’s Looks Suspicious So It Would Be Smart To Change Tt.



8) Click on Server Icon To Continue. Here You will Choose An Icon For Your Server File To Have. The Icons Help Mask What The File Actually Is. For Example I Will Choose The Regular Text Document Icon Since My File Is A Document.









9) After This, Press Create server, Your Server Will Be In The Same Folder As ProRat. A New File With Name "binded_server" Will Be Created. Rename This File To Something Describing The Picture. AHacker Could Also Put It Up As A Torrent Pretending It Is Something Else, Like The Latest Game That Just Came Out So He Could Get People To Download It.


Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.



12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.



15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.



Note : To Get Ip Address Of Victim You Need To Trick Him Tell Him That Go To This Site And Tell Me The Number's You See Or If He Knows What Ip Is Then Tell Him To You That And You Will Show Him A Magic Trick With That (Problem? Hacking!)

New Method Coming Soon :D
Follow The Blog

2 comments:

  1. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete
  2. How To Hack Someone'S Computer Easily ~ Welcome To Fivestarhacks >>>>> Download Now

    >>>>> Download Full

    How To Hack Someone'S Computer Easily ~ Welcome To Fivestarhacks >>>>> Download LINK

    >>>>> Download Now

    How To Hack Someone'S Computer Easily ~ Welcome To Fivestarhacks >>>>> Download Full

    >>>>> Download LINK TZ

    ReplyDelete