Jumat, 30 September 2011

Hacking With ProRat

This time let's play with one of the hacking tools, namely ProRat.

Tools made of Turkey is very unusual, this tool serves to infiltrate other people's computers. The trick is very simple and easy, we live to know the IP and Port victim's computer, and then we can directly infects.

A. How to use ProRat

1. The first time we have to know in advance the IP and Port of victims that are open. We can do it the manual way or also with the help of Ports Scanner.


From the picture above we know all the active computer's IP and Port where it is exposed. That will be the victims in our experiments this time is a computer with the IP 192.162.10.233.

2. The next step is we run ProRat, these tools can be downloaded at http://www.prorat.net. Previous disable your Anti Virus first, because ProRat will be detected as a virus though out it is not harmful to our computer. After that fill the victim's IP in the form of IP and port (default 5110).


If we click the Connect button we cannot connect to a victim's computer, because we have not infected the victim's computer. To infect a victim's computer we have to create a server that will run on the victim's computer. The way is click the Create button - Create ProRat Server. Then we will see the appearance of Notifications:


Check the option Use Proconnective Notifications and contents of the IP (DNS) with our IP addresses. On the General Settings tab we fill Server Port (default 5110), Server Password and Victim Name.


On the Bind tab with file we can smuggle a file that will run in conjunction Server. Free file extension.



Next is the Server Extensions tab, there are several options the server extension. We choose an extension. Exe.


To create a server icon we click the Servers tab icon, select the icon whatever you want.


The final step of making this server is clicking Create Server.


Once successful, will appear:



3. We just run the Server victims computer. The trick is up to you ... want to secretly infiltrated or using Social Engineering techniques and also can you infect it directly on the computer.

4. Once the server is successfully running on the victim's computer, then we immediately try to connect it with our computers.

5. For connection we can use ProConnective or directly typing the IP address and port the victim's computer. ProConnective are innate tools of ProRat that serves as a Bridge (bridge connection) between server computers and client computers (the victim). IP would seem the victim when it was on.


6. After successfully connecting to the status of the victim's computer ProRat will change from Disconnected to Connected




7. Well ... it's time we play. There are many things we can do on a victim's computer as the information of your PC, send an error message, turn off the computer, lock mouse, and open the CD-ROM or even photographing the victim's face.

8. Now we will see the victim's PC info:


From the picture above we can see the information held by the victim's computer.

9. We also can send a fake error messages to the victim's computer:


10. Installing Keylogger.


11. And most exciting is to see the faces of the victims who we hack.


How exciting right? That's still a fraction of the usefulness ProRat many more other functions, such as formatting the hard drive belongs to victims, disrupting the registry, steal critical data, and so forth.

B. Preventive measures
  1. Update your Anti Virus is always to be able to detect any infection from ProRat. ProRat server usually detected as   "Trojan.Dropper.Prorat.DZ.29, Dropped: Backdoor.Prorat.DZ."
  2. Install Anti ProRat, you can download it at www.softpedia.com / get / Antivirus / Anti-prorat.shtml.

Good luck...

2 komentar:

Riefz mengatakan...

support night by me!!

indovision mengatakan...

thanks bro tutorialnya.. :D

Posting Komentar

Your Ad Here
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Host