Welcome to the Gabol Hacker Crew: For sure you will be wanting to hack a pc..!
Firesheep VS Blacksheep lets see who wins. See the post on firefox LINK See the post on Blacksheep LINK Learn how to hide files in pictures LINK Browse Anonymously anywhere – Bypass Firewall & Proxy LINK How to hack a WEP wireless Connection LINK How to be safe from Hackers..! LINK Are you safe.? LINK Top Websites Vulnerable to XXS attack LINK How to Track Your Stolen Laptop LINK Turn Your Firefox into a password Stealer Without any Software LINK How to Find a Serial Number for Any Program LINK How to hack a Email LINK These vulnerability sites cn get hacked by shells.. LINK How to HACK Facebook,hotmail,Yahoo,Gmail,Twitter,Orkut,Myspace and msn Passwords. LINK Mind belowing..!!! LINK

Wednesday, August 11, 2010

For sure you will be wanting to hack a pc..!

This is the main topic every one ask me How to hack a computer so to Answer that i have uploaded this..




.

  well first of all you should know what type of hacking this is called and how itz done..

  -TO Hack someone's computer and to get control over his computer you will need RAT (Remote Access Technology) programs which will let you connect your victim's computer by sending a Server which in turn will provide you the information to connect to your victim's pc.
   Some of the basic information send by the server is IP Address which is very useful to connect to your victim pc.


-What is Ip Address  ``(If you know about IP ADDRESS SKIP THIS PART)
  
An Internet Protocol address (IP address) is a numerical label that is assigned to devices participating in a computer network that uses the Internet Protocol for communication between its nodes. An IP address serves two principal functions: host or network interface identification and location addressing  .Example : lets take a example two brothers, Lets say first one is Faizan and second one is Ammar  are going on a tour and want to be connected with each other by Mobile phone but as through this to do They need a SIM card (subscriber identity module) As they will buy SIM card they will get a Number which can help them to connect each other by dailing the number provided to them...So IP ADDRESS is a number given to you as you login to the internet.




-Ok now its get back to the topic...  
   
          
               Now you Have the Client (RAT program) you can make a Server from it which is just like a bright to its Client. Now as you made this Server you have to sent it to your victim to connect to it..  You can customize your server by changing its icon , name , and binding it by a file. 
The main thing to keep in mind is to make it in such a way that your victim will be wanting to accept it.. 


-Basic thing you have to give.

             Now as you know what is RAT now you need to know how the information will be send to you..To get the information are three Major types which are supported by almost all Client


1-Email Notification


2-ICQ Pager Notification


3-CGI list Notification


4-FTP Nottification


 In this tutorial i will just say you about Email Notification and ICQ Notification But if you want me to Explain CGI list Notification then comment on and i will Explain..


--Email Notification

      As this is the most easiest one you i recommend  you to use this.
--Support,, 
  It does not support's Yahoo , Hotmail or Gamil but it supports from mails.com because yahoo , hotmail and gmail providers monitor on the emails so they will not allowed this kind of emails.. but you can use www.mail.com or any other which provider does not monitor  on emails.. 




  --ICQ pager Noticatioin
  
            ICQ (Instant messaging Computer ProgramICQ users are identified by numbers called
 ' UIN ' . You have to put your UIN number to the sent you the victim's information 
        For more information on ICQ goto WWW.ICQ.COM




      --Now here's the main part..


   As I have explained the RAT program to you Now you are capable for using this Program.
There are many RAT programs but here i will choice ProRat Program to get you on the hacking world..
                                                           Snapshot of ProRat

Now go to Create> Create ProRat Server












1-Notification Settings :

          Provide the way that you want proRAT to sent you his IP Address and then later you have to jst type his IP Address on the Option [ IP ] and thatz all you will get connected through it.





  • --E-mail Notification (Doesn't support Reverse Connection) :
  • You must check mail notification button first and then you have to type your e-mail that you want to receive notifications. ProRat will resolve the SMTP server request so you don't have to type it and this ProRat notification method will send the email notification directly to you so you won't loose any victims incase your email isn't deactivated.
    After you have typed you notification Email address please click on the test button to see the results you will receive a test email from ProRat. If you receive an email there is no problem for this notification.
    You can use all kinds of Webmail services and Popmail services too, we don't recommend you to using services like yahoo, hotmail etc. because they have got many security methods, for example mynet email services doesn't except any mails from Cable Internet users and there is security methods like ''Junk Mail Filter'' and they can refuse the notifications too, but if you want to use hotmail or yahoo etc, you have to go options and close the Junk/bulk mail filter.







  • --ICQ Pager Notification ( AlsoDoesn't support Reverse Connection) :
    First check USE ICQ PAGER NOTİFİCATİON button and then type your ICQ Uin in the blank field, and test the notification by clicking on the Test button that is all for this notification method. You will receive a notification from ICQ as a pager if it works. With this notification every time your victim connects to Internet you will receive a ICQ pager notification to your ICQ and you will see the information which you need to connect to your victim on the pager.if you dont know about ICQ try your best friend Goolge.com to help you..






  • CGI List Notification :
                  I will explain this method if you guyz ask me for this ... becoz this is lil advance .. but itz the best one from these all..

2-General Settings :
General settings are one of the most important places while creating a server. We tried to explain the features listed in General settings below :






  • Server Port :
    If you want to connect to a PC you must choose a port that you want to use. The default port number is 5110 on ProRat. If you type a port number that is being used by another program ProRat client might not be able to work properly on the server, and if you are not a advanced user of computers and if you don't much have knowledge about ports we recommend you to use the default port of ProRat which is 5110.






  • Server Password :

    You can protect your victims from other ProRat user with a password protection. If a user doesn't know your password they can't connect to your victims PC. The default ProRat Server password is 123456. We recommend you to choose a different password when creating the server.






  • Victim Name :

    You can create many servers and you can have many testers and many victims so if you don't want to mix them and get confused you can give different names to your victim servers and you will never get confused. CGI list and mail notifications will give you notifications with the names of your victims.






  • Give a fake Error Message :

    This button will let you to configure a message when the server will open. You can trick your victim by putting a error message on the server. When your victim try's to open the server the message you adjusted will appear.






  • Configure Message :

    This button will activate when you select the "Give fake error message" box, and you can adjust the settings from this button.






  • Melt server on Install :

    If you want your server to disappear on the target PC, You have to check this box. If you check this box server will automatically disappear after its executed so your victim will have no choice to investigate the server you created.
    If you bind your server with a file and run it, the server will be lost and there will only be the binder file left on your victims PC.
    For example think that you have a server named picture.exe and you bind it with a *.jpg picture. When this server executed in target PC the picture.exe will automatically disappear and there will be only picture.jpg.

    Warning! :
    When you check this box you will not remove the server. Server will be installed on the system and it will start every time your victim connects to Internet, The server can only be removed local or when you are online.






  • Kill Antivirus-Firewall on start :

    If you check this box and create a server, the server will disable antivirus and close the firewalls running on the target system and this can be a useful feature because antivirus can delete the server and firewall can also block the Internet activity of the server.






  • Disable Windows XP SP2 security Center :

    When you check this box you will disable the new Windows XP Service Pack 2 security center. If this box is not selected you also can't diable XP internal firewall.






  • Disable Windows XP Internal Firewall :

    Windows XP, 2003, Longhorn operating systems has internal firewalls included if you don't kill them you can't connect to target PC. You must check this box for connections.






  • Clear Windows XP Restore Points :

    Windows ME-XP, 2003, Longhorn operating systems have got SYSTEM RESTORE abilities so if you don't check this box your victim's can restore their systems to a date which they were not infected from the server and you won't be able to connect anymore. If you check this box they won't be able to use the system restore function.






  • Don't send notification from LAN IP's such as (192.168.*.*) or (10.*.*.*) :

    If you check this box server will not send any notification to CGI list, e-mail and as a ICQ Pager because they don't support connections which are behind networks and behind routers, but if you check this box ProConnective notifications will get their notifications normally, because it supports reverse connection. You must be a Special Edition User to use the ProConnective function otherwise you can't connect to computers such they are behind networks and routers.






  • Protection for removing local server :

    If you check this box, the server cannot be removed without server the server password even if you are trying to remove it in a local way, ProRat client will not give permission for this process.






  • Invisibility :

    It is very important to check these 4 boxes too. if you check all these boxes ProRat will work very silently so 2.party programs will not be able to detect the server.

3-Bind With a File :

 You can bind your server\downloader server with a file that you want. You must click on the ''Bind the server with a file'' button and then the file button will be activated. You can choose a file to be binded with the server now. The extension is not so important you can see the size of binded server in the ''Server Size'' part.

4-Server Extension :

 You can choose the extension of Server\Downloader server that you will create. ProRat server supports 5 extensions. You can use these extensions for server: *.exe - *.scr - *.pif - *.com -*.bat
But 2 of them supports icons. Other ones don't supports windows icon service. *.exe and *.scr has got icon support so you can choose icon for this extensions.

5-Server Icon :

 If you choose a extension that has got a icon support. You can select the one you want to use with the server from the small pictures on the menu, but don't forget icons will make the server size a little bigger then the normal size.
If you want to use these icons click on the ''server icon'' section and select the ''Server icon'' box. Choose one of them and your server will use this icon after created.

Now your settings are done and you will only click on the Create Server button. You can see you server when its being created from the loading box at the and of this process your server will be ready to it's job. You can change the server's name and you can send it as Downloader server or directly to your testers or victims.
You can put your server on startup folder in victims PC so it will automatically run on first restart.
Startup path on win2k systems :
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\
Startup path on Win9x systems :
C:\Windows\Start Menu\Programs\Startup\





  Later i will be giving screen shots. 
                    
                                To download this RAT Program links are provided below:
                         
                                                 www.prorat.net             ( official site of ProRat ) 
                          
             Feel free to ask question....