Pages

Saturday, 18 August 2012

Hack any computer with ProRat



In previous post I wrote about what is a RAT, hope you all read it. Now this time I am posting a tutorial about one of the most famous RAT program ProRAT.


1. First download a ProRAT program, (I will soon be updating this post by adding download link for proRAT) Extract all datas into the folder.

2. You will got a window something like this.








 3. Now click on create button.

  4. click on the "Create ProRAT server 342kbayt"








5. Now in "PC connective Notification Network". put your own IP address. You can find your IP address here

Now in "Mail notification" put your own email ID hope you know this(joking :-p). This column is used to connect ProRAT server to you computer and and send you email of the logs that its keylogger will record.

6. Now click on the "Create server" a pop up window would appear stating
"The server has been created" the server will be created in the default directory i.e. in the folder were proRAT is kept.







7. Not everyone would be willing to click on anything with .exe extension so, what we need to do is to hide the server.exe file. Best way is to bind it with another file such as some mp3 or some jpeg for which victim may fall for. Now click on the bind server with file option, click on select file browse and choose the file you want to bind server with click on bind.





8. Server file when created looks suspious, you can also change the server icon just go to server icon and choose the icon you want from the entire collection.

Now, you need to send this file to your victim, here you need some social engineering. First off all make a RAR archive for server as you can not send .exe file via email due to policies of service providers. Bind the file with any favorite song or picture of victim or to anything that victim will be compiled to click on and once he clicked he is all yours.

PROs and CONS
ProRAT is a complete package, it is a RAT, a keylogger, binder etc.
ProRAT has been around for quite a long time.
As its around for quite a long time it can be detected by anti viruses during scan time but is undetectable during run time.
Hope you guys liked this tutorial please leave comment for any quires and suggestions.
by this method you can also hack any email or social networking accounts.


1 comment:

Related Posts Plugin for WordPress, Blogger...

အေထြးေထြးနည္းပညာမ်ား