Tampilkan postingan dengan label RAT. Tampilkan semua postingan
Tampilkan postingan dengan label RAT. Tampilkan semua postingan

Rabu, 12 Oktober 2016

AnonSec Hackers feat PhantomGhost on #OperationPayBack



AnonSec dan PhantomGhost dua team hacker besar sekarang berkolaborasi dalam suatu Opertion untuk melakukan penyerangan terhadap pemerintahan, bank, pedophiles, perjudian online, dan website pornography.



AnonSec yang dulunya pernah sukses dalam #OpNasaDrones dan berhasil menjatuhkan Drone milik NASA ke laut, kini AnonSec akan kembali menguji kemampuannya bersama PhantomGhost dalam #OperationPayBack.

Bukan hanya AnonSec dan PhantomGhost, tetapi banyak team hacker lain yang mengikuti #OperationPayBack ini seperti: Codersleet, UICF, CyberTeam Rox, dan team hacker lainnya.

#OperationPayBack akan di mulai pada tanggal 12 Oktober dan puncaknya pada tanggal 5 November 2016.

Adapun tujuan mereka melakukan Operation ini terlampir di dalam keterangan resmi dari CEO PhantomGhost
#OperationPayBack Is to provide code to fears about the government that oppresses us, to give ideas to people who have been silenced by those in power, and spreading a sense of brotherhood for the watched/underlayed Dog...
Untuk lebih lengkapnya tentang #OpPayBack ini bisa di lihat langsung pernyataan yang di lampirkan oleh CEO PhantomGhost di http://pastebin.com/TECBnMD0

Selanjutnya xwarta.com akan menjadi website berita resmi yang selalu update berita terbaru tentang #OperationPayBack.
(IF22)

Di like ya FP yg mensponsori xwarta
 Hotel Grand Zuri Duri
Read more

Kamis, 18 Agustus 2016

Sekarang Meretas PC dan SmartPhone Semakin Mudah



RAT (Remote Administration Tool) adalah sebuah software yang memungkinkan remote "operator" untuk mengontrol sistem seolah-olah ia memiliki akses fisik ke sistem itu. (wikipedia).

Dengan software RAT, kita bisa melakukan hacking terhadap PC ataupun SmartPhone orang lain. Ada banyak software RAT yang beredar di internet yang bisa dengan bebas di download mulai dari secara gratis sampai dengan berbayar.

Biasanya RAT yang di download secara gratis itu sudah di sisipi virus RAT yang digunakan oleh hacker lain untuk meremote PC kita. Oleh karena itu jika ingin menggunakan RAT kita sebaiknya membeli ke penjual yang terpercaya.

Harga penjualan RAT juga tergolong sangat MURAH biasanya harganya berkisar antara Rp.20.000 sampai Rp.50.000 tergantung penjualnya dan fitur yang di berikan oleh RAT tersebut.

Berikut adalah screenshoot dari  RAT PC




Untuk RAT Android bisa dilihat di situs resminya DROIDJACK

Read more

Minggu, 06 Juli 2014

Any Keylogger for Mac OS X


Any Keylogger for Mac OS X, as one of simple but effective keylogger for Mac OS X, can log all activities on Mac and able to send the logs to email address to help you remotely master your computer's activities. 

Any Keylogger for Mac has 6 major feature which is basic but enough to monitor your Mac's activities.
Besides, Any Keylogger for Mac run stealthily on the background of the Mac so that other people who can access the computer can't randomly change the settings of the software or even close the software.

With simple interface and effective monitoring features, Any Keylogger for Mac has won a number of Mac users and awards. Any Keylogger for Mac is a good solution to Mac activity monitoring.

Any Keylogger is also available for Windows :- Click here

Download AnyKeylogger for Mac:-

Some Key Features:-



 Visit AnyKeylogger For Mac:-
Read more

Rabu, 05 September 2012

Twitter Hacking : How To Use PRORAT Software To Hack Password

This is step by step tutorial that explains how to use pro rat software. ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server. ProRat opens a port on the computer which allows the client to perform numerous operations on the server (the machine being controlled). ProRat is available in a free version, and a paid version. In the free version, ProRat cannot connect to users over wide area networks (WANs), only over LANs (Local Area Networks). ProRat is known for its server to be almost impossible to remove without up-to-date antivirus software. 

Follow The Steps To Setup PRORAT Software

Step 1: Download free software called PRO RAT from this LINK . Once you downloaded pro rat software you'll see win rar file . Enter the password pro and extract it to your computer . Launch pro rat. Pro rat has a lot options as keylogger , screen shot , file manager, pc shutdown. 

Step 2: You should create ProRat Server and send it to the target pc . To create server click on the bottom Create

hack facebook hack password

Step 3: Enter your ip address if you don't know your ip address click on red arrow . Also add your email address that will be used to send email notification.

hack facebook hack password

Step 4: Next go to general settings, , 5110 is port that you will connect to the target pc , you can change server password . You can give a fake error message, when target launch your remote file , error message will shown . You can type for error message what ever you want .

hack facebook hack password

You can use option bind with the file. you can bind server with any file. I didn't use this option in this example.

hack facebook hack password

hack facebook hack password

Under server extension I recommend to use EXE (has icon support ) or SCR(has icon support).

hack facebook hack password

Under server icon select any icon that you want that your server look out.

hack facebook hack password

Step 5: Click on Create Server . Now you need to send server file to the target pc . There are many ways how you can do it. You can create server file that looks as image and email it to your friends . The most effective way by my opinion is to bind server file to the movie file and upload it to the torrent or rapidshare . 

Step 6: After the target clicks on your server file you'll be able to connect to the target PC. In main window of pro rat you'll see IP field. Type target pc address . There are many ways how to find target pc ip address. I recommend you to try to hack friends pc , so just ask your friend to give you ip address . In the port field type 5110 and click Connect.

hack facebook hack password

hack facebook hack password

Screen shot of hacked pc :

hack facebook hack password

File manager of hacked pc. You can download any file from hacked pc.

hack facebook hack password

NOTE: This article is only for education purpose . Don't try to use it on the computers without user (owner of the computer that you want to hack ) permission!!!!
Read more

Rabu, 15 Agustus 2012

How to hack keyloggers or RAT's server password

Keylogger's and RAT's nowadays are everybody's problem across the internet. Hackers use keyloggers to hack the email passwords of the victim which they receive in the form of emails or text files on their respective FTP servers. They spread their keyloggers with the help of cracks, keygen's or patches of popular software's or simply through hack tools. So friends, today i will teach you how to reverse engineer the keylogger or RAT to hack the hackers FTP server or email password

Most of hackers thinks that they are too smart, so what they do bind their keylogger or Rat servers with popular programs and when user open that their system got infected and hence what ever they type is get recorded and sent to hacker. 

Now all keyloggers sent data to hacker in regular intervals (usually every 5 to 10 minutes) by using below to ways:

1. Using the Emails : where hacker configures his email ID and password while creating the server. Keylogger records the key strokes in a temp file and sends it to the hacker in form of emails. But this has a limit as most free email servers like Gmail or Yahoo or Hotmail has limit of 500 composed and received mails. So most hackers use the second method.

2. FTP server : While creating the keylogger server, hacker configure their FTP server, where they receive the logs of key strokes in the form of text file( usally labeled on the basis of current system time stamp). Hackers keylogger server uploads the files to FTP server after every few minutes interval.

So friends, here the actual trick or loophole in above technique lies. If we monitor the everything coming in and going out of our Ethernet card or Wireless then we can detect that what is going out of our system. Its nothing but just monitoring your your system's traffic, where its going and from where its coming. You can use any of the tool that monitor the packet flow of your Ethernet or wireless card.
ok...ok.. let me tell you my favorite tool for doing the same. I love Wireshark because its simply superb.

Wireshark is a very famous network scanning hack tool which is used by hackers or network forensic experts to monitor the packet flow of their network cards like Ethernet or WLAN. It records the each and every packet coming and going out of your system's Network card. Now you all must be thinking wth is this Packet. Packet is nothing but just a bunch of bits(data in form of 0 & 1) usually 32bit or 64bit. In network terminology, data is termed as packet which can be either TCP or UDP( both contains the header n other stuff accordingly). 

So friends, whenever you feel anything suspicious in your system like your system is compromised or you are infected from a keylogger or RAT or simply you want to test a hack tool and you are not aware that hack tool is safe to use or not. Just follow the below procedure to reverse engineer these noob hacking tools.
Note: Every keylogger or RAT sends the logs to hacker's FTP server or email account after few minutes interval( when you are connected to internet) but some novice keyloggers even tries to send data while you are offline and hence the data sending keep on failing. In some situations it displays warning message and in some situations you PC gets hanged or SVHOST service CPU usage increases. But nothing matters whether it sends logs online or offline, the only thing matter is time period, after what interval it sends data.

Steps to Hack or reverse engineer the Hacker's Keylogger server password:

1. First of all download and install the wireshark. You can easily get this using by Googling it. 

Note: While Wireshark is getting installed, ensure that it installs the Winpcap with it other it won't work properly.
2. Now go to the Capture button in the top menu of the Wireshark as shown below and select the interface( means your network card which can be Ethernet or WLAN).




3. Now it will start capturing the packets through that Network card. What you have to do is just keep capturing the records for atleast 20 - 30 minutes for getting the best results. After 20- 30 minutes, again  go to capture and stop capturing the packets.

4. Now you need to filter your results, for this Go to the filter box and type FTP and SMTP one by one. Note: if you get records for FTP then hacker has used FTP server and if you didn't got FTP that means hacker has used SMTP, so give SMTP in Filter box.

5. As you scroll down you will find the “FTP username” and “Password” for victims ftp account in case FTP server is used.  And if hacker has used SMTP then you will find "email address" and its "password" that hacker has used to create keylogger.

6. That's all my friends. Isn't that too easy.
Read more