Friday, 2 January 2015
Disable your antivirus otherwise it will delete this tool, Don't worry it will not harm you at this stage.
Now run the prorat.exe file..
A PRORAT screen will appear, Many option will be there but you have to create a server first.
So click on create server.
There will be 3 options
1. Create Prorat server
2. Create Downloader Server
3.Create Cgi Victim List & usage
now click on create prorat server
A new window will popup. which will have a lots of options in side bar.
Notifications
General settings
Bind with Files
Server extnsions
Server Icons
You have to use all options one by one to create a server.
Now in Notofication. Mark on Use Mail Notification and enter your email id. there will be a default id. Erase it and enter your. Then Test. It will send a testing mail to your email. Check your spam too.
Then Go to general settings and select all the options which you want to have in your trojan.
Then go to Bind with file and select file to bind your trojan with.
At last select your server extension and icon. Then click on Create server.
Now you have created a server.
Send this server file to the victim you want to hack, but before sending this file to victim make it FUD (Fully UnDetectable) with FUD cryptors. Google it for FUD articles.
after creating server FUD, it is ready to send to the victim.
Send this file to the victim. If the victim will run the server in the system, Trojan server will send you the notification email with the IP address of the victim. Use this ip and run your prorat.
At the top there is an option for IP and port. Enter thr IP and port and click on connect.
wait to connect.
After getting connected to the victim's system.. you can use any of the options available on the prorat to hack the user's system.
Subscribe to:
Post Comments (Atom)
Search
Followers
Popular Posts
-
Bypassing UAC with PowerShell Recently during a Red Team engagement, I got shell access to some user machines using Client Side Att...
-
Note: This Article Is Not For Noobs! Learners Are Welcomed! This Article Is For Educational Purposes Only, Any Misuse Of Information Give...
-
Just follow the steps as given below :- First copy any Image to your C: directory Open cmd by going Start-Run program- type cmd (A...
-
SyntaxNet: Neural Models of Syntax. Installation Running and training SyntaxNet models requires building this package from source. Yo...
-
You Have To Follow These STEPS: 1. Open notepad and paste the following code in it. 2. Change the password in place of (qwe...
-
Go to Start > Run > type " regedit ". Once in regedit go to [HKEY_CURRENT_USER\Software\Microsoft\Window...
-
So Here Is A Trick Now U Can Chat With Your Friend Through Command Prompt.. You need only your friend IP address.. Open Notepad and ...
-
Today our tutorial will talk about Kali Linux Man in the Middle Attack. How to perform man in the middle attack using Kali Linux?we will ...
-
This article is a quick, comprehensive guide on setting up your newly installed KaliLinux2.0 (very attractive new GUI by the way) for secu...
Blog Archive
-
▼
2015
(72)
-
▼
January
(38)
- Posting your Facebook Status Upside Down...
- Is Free Antivirus Really Good?
- QUESTIONS THAT CAN COME IN YOUR C PROGRAMMING TEST.
- Basic C PROGRAMMING LPU
- Create Facebook Page without Name-How to Guide
- Refresh Your Full Computer By Just One Click
- Making own Simple Port Scanner
- Hacking With PRORAT...
- Use Google as A proxy..?
- Hacking A Iphone Passcode....
- How to Create folder named CON?
- Skip the Annoying "Use the Web service to find the...
- HOW HACKERS GET CAUGHT.
- HACK A WEBSITE WITH HTML CODING...
- Magic In Windows..
- Compress 1 GB into 10 mb
- Online chat tricks..
- Make Your own speaking programme with Batch file a...
- Programme to annoy anyone one..
- DDOS ATTACK MANUALL
- HOW TO BLOCK YOUR ENEMY'S SIM CARD
- HOW TO CHANGE THE ICON OF YOUR PEN DRIVE
- Disable the “Send To” Folder on the Windows Explor...
- WMIC commands for Auditor and Hacker
- How to "Delete administrator Password" without any...
- How To Use Mobile Camara As A Webcam
- Setting A Video As Desktop Wallpaper..
- Send Coloured Message on Facebook...
- How To Stop Someone's Internet Access..
- Facebook Hacking
- How To Hide Drives in Windows?
- Advance Matrix Efect Using Notepad...
- How To Grab Your Friend IP
- HAVE YOU DOWNLOADED TORRENT FILE WITH IDM
- Want to crack BIOS PASSWORD...
- Some Windows Amazing Tricks
- Chat With Friends Through Command Prompt(CMD)..
- Shutdown Your PC by Timer...
-
▼
January
(38)
Text Widget
Powered by Blogger.
0 comments:
Post a Comment