Saturday, July 2, 2011

[TROJANS]
Now that you have your victims ip address you now need a trojan software such as sub7 this software is also known as RATS (im not listing RATS you can find them out for yourself but i will post i link at bottom of website that might help you) Once you have the software (RAT) you will need to send the victim your server, (WARNING! if you victim has a firewall or anti - virus software then you've had it cause the firwall will block you out and the anti - virus software will delete your server. but if you lucky and your victim is a idiot and has no security on there pc then just send them it and use the ip address you found to connect to them.

[CMD COMMANDS]
Netstat = displays ip address connected to your computer (victims)
Ping [IP] = shows if the ip specified is real
Nbtstat -a [IP] = if this shows a list of stuff and a 20 in one of the rows then you can do stuff.
 

what is Hacking ?

Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works.

What are Hackers?
Technically, a hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. Under such a definition, I would gladly brand myself a hacker. However, most people understand a hacker to be what is more accurately known as a 'cracker'

What are Crackers?
Crackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer.