this time let's play with one of the hacking tools, namely prorat.
tools made by The Turks is very remarkable, these tools serve to infiltrateother people's computers. The way is very easy and very easy, we liveknow the IP and port of the victim's computer, then we can directly infect it.
1. First time we must know in advance the IP and port of the victim that is open.We can do it by manual means or also with the help of PortsScanner.
From the picture above we know all the IPs of the active computer and any portsopen. What will be sacrificed in our trials this time iscomputer with IP 192.162.10.233.
2. The next step is we run ProRat, these tools can be downloaded athttp://www.prorat.net. Previously matiin first Anti Virus you (disable), becauseProRat will be detected as a virus. But he's not dangerous to computers.we. After that fill in the victim's IP on the IP form and its Port (default 5110).
If we click the Connect button then the connection to the victim's computer can not be, becauseThe victim's computer hasn't been infected. To infect our victims' computersfirst create a server that will run on the victim's computer.Click the Create – Create Prorat Server button. Then the view appearsNotifications :
Check the use proconnective notifications option and fill ip(DNS)address with IPwe. On the General Settings tab we enter server port (default 5110), ServerPassword and Victim Name.
On the Bind with File tab we can insert files to run togetherServer. Free file extension.
Next is the Server Extension tab, there are several options of server extension. weselect the extension . Exe.
To create a server icon we click the Server Icon tab, select any icon youWant.
The last step of creating this server is to click Create Server.
Once successful, it will appear:
3. We just run the server on the victim's computer. The trick is upyou... want to be infiltrated secretly or use Social Engineering techniques and alsoyou can infection directly on the computer (kalo bias sihh).
4. After the server successfully runs on the victim's computer, then wedirectly try to connect it with our computer.
5. For connections we can use ProConnective or directly type ipaddress and port of the victim's computer. ProConnective is the default tool from ProRatthat serves as a Bridge between the server computer and theclient computer (victim). It will appear the victim's IP when he is on.
6. After successfully connecting to the victim's computer, the status of ProRatwill change from Disconnected to Connected
7. Well... It's time for us to play. There are many things we can do on a computervictims such as knowing information from the PC, sending error messages, turning offcomputer, lock the mouse, unlock the CD-ROM or even photograph the victim's face.
8. Now we will see the victim's PC info:
From the picture above we can see the information that is owned from the victim's computer.
9. We can also send false error messages to the victim's computer:
10. Installing Keylogger.
11. And the most exciting thing is to see the faces of the victims that we hacked.
How exciting is it? That's still a small part of ProRat's usefulness.other functions, such as formatting the victim's hard drive, messing with theregistry, steal important data and so on. However, inour discussion this time we suffice so many yes. Ok!Use it well yes...
B. Prevention Methods
1. Update always your Anti Virus to be able to detect the presence of infection from ProRat.Usually ProRat servers are detected asTrojan.Dropper.Prorat.DZ.29, Dropped:Backdoor.Prorat.DZ.
2. Install Anti Prorat, you can download it in www.softpedia.com/get/Antivirus /Anti-prorat.shtml.
Comments
Post a Comment