[TROJANS]
Now that you have your victims ip address you now need a trojan software such as sub7 this software is also known as RATS (im not listing RATS you can find them out for yourself but i will post i link at bottom of website that might help you) Once you have the software (RAT) you will need to send the victim your server, (WARNING! if you victim has a firewall or anti - virus software then you've had it cause the firwall will block you out and the anti - virus software will delete your server. but if you lucky and your victim is a idiot and has no security on there pc then just send them it and use the ip address you found to connect to them.
[CMD COMMANDS]
Netstat = displays ip address connected to your computer (victims)
Ping [IP] = shows if the ip specified is real
Nbtstat -a [IP] = if this shows a list of stuff and a 20 in one of the rows then you can do stuff.
Now that you have your victims ip address you now need a trojan software such as sub7 this software is also known as RATS (im not listing RATS you can find them out for yourself but i will post i link at bottom of website that might help you) Once you have the software (RAT) you will need to send the victim your server, (WARNING! if you victim has a firewall or anti - virus software then you've had it cause the firwall will block you out and the anti - virus software will delete your server. but if you lucky and your victim is a idiot and has no security on there pc then just send them it and use the ip address you found to connect to them.
[CMD COMMANDS]
Netstat = displays ip address connected to your computer (victims)
Ping [IP] = shows if the ip specified is real
Nbtstat -a [IP] = if this shows a list of stuff and a 20 in one of the rows then you can do stuff.