Powered By Blogger

Tuesday, May 31, 2011

proRAT- Download the most Deadly Remote Administration Tools....

Hello friend’s…You must Have Used or Studied About many different type of Hacking Softwares or tools…But Today We will Understand the usability and Functioning one Killer Software named PRORAT…Its the Most Deadly REMOTE ADMINISTRATION TOOL….That can be used to hack any system Remotly….

HOW TO USE:

STEP-1 – Download the ProRat zip setup from the following link –> DOWNLOAD

STEP-2: Creating the ProRat server. Click on the “Create” button in the bottom. Choose “Create ProRat Server”.

STEP-3: Open Notifications. Select second option “Mail Notification”. In the E-MAIL field you will see a mail

id: bomberman@yahoo.com. Remove this mail ID and give your own mail id here. You will receive a notification

email on this email id whenever you victim will be connected to internet from the infected system.

STEP-4: Open General settings. This tab is the most important tab. In the check boxes. here is a quick overview

of what they mean and which should be checked.

Key:

[ ] = dont check
[x] = check

[ ] Give a Fake Error Message. (when they open the file, it gives an error message.
[x] Melt server on install. (this will cause the server to ALWAYS connect to the internet when the victim gets

online)
[x] Kill AV – FW on Install. (this causes the anti-virus and firewalls to SHUT DOWN and stay off once installed

on the victim’s computer.
[x] Disable Windows XP SP2 security center
[x] Disable Windows XP Firewall
[x] Clear Windows XP Restore Points
[ ] Dont send LAN notifications ( keeps other computers on the victim’s network from knowing about you )
[ ] Protection for removing local server

In the Invisibility Box, check all 4 boxes.

STEP-5: Open Bind With File. You can bind your server\downloader server with a file that you want. You must

click on the ”Bind the server with a file” button and then the file button will be activated. You can choose

a file to be binded with the server now. A good suggestion is a picture because that is a small file and its

easer to send to the people you need.

STEP-6: Open Server Extensions. I prefer using .exe files, because it is cryptable. Mostly crypters don’t

support .bat/.pif/.com etc. So use .exe files.

STEP-7: Open Server Icon. You can select the one you want to use with the server from the small pictures on the
menu. You can use an icon from your computer also. Press the “Choose new icon” button.

STEP-8: After this, press “Create server”, your server will be in the same folder as ProRat. A new file with

name “binded_server” will be created. Rename this file to something describing the picture.

[NOTE: PLS DO NOT OPEN THE FILE "binded_server" on your system.]

STEP-9: Sending this file “binded_server” to victim. You can send this trojan server via email, pendrive or if

you have physical access to the system, go and run the file.


From EMAIL, you can not send this file as it is because it will be detected as TROJAN OR VIRUS. Password protect this file with
ZIP and then email it. Once your victime download this ZIP file, ask him to unlock it using ZIP password. When
the victim will double click on the file, he will be in your control.

STEP-10: Connecting to the victim’s computer. Once the server has been sent and the person has opened this ZIP

folder, they will now be infected with it. AND HAVE NO CLUE ABOUT IT!. On the top of the ProRat program you

will see a box in the upper left corner. Type in the victim’s IP address and make sure the port is 5110. Now

press Connect. You should now see a pop-up box wanting to know a password. Remember the password you entered

while creating the server? that is what you need to type. By default, it is “123456″ without quotes.

STEP-11: Check your email, (junk in needed), and find the “Your victim is online”. Copy and paste the IP

address onto ProRat where it says “IP:[127.0.0.1]“. Press CONNECT, DO NOT CHANGE THE PORT, if u did change it

back to 5110. Type in the password (default is usually 123456, it is in the email). Your done, now you can mess

with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will

make the computer useless.

NOTE: THE AUTHOR IS NOT RESPONSIBLE FOR ANY DAMAGE DONE USING INFORMATION IN THIS ARTICLES.THIS ARTICLES IS FOR EDUCATIONAL PURPOSE ONLY. SHARE YOUR CYBER KNOWLEDGE FOR HUMANITY.FIGHT AGAINST CYBER TERRORISM.

JAI HIND......

FROM:KRUNAL UPADHYAY

No comments:

Post a Comment