I am a 3x Entrepreneurs. Love writing code and sharing what I learn everyday as a programmer and an entrepreneur.

August 10, 2007

THE BEGINERS GUIDE TO TROJAN HACKING-VOLUME 1

**Feel free to distribute this text however you would like, all I askis that you don't modify it in any way. If you would like to giveme a yell then by all means come and find me**

I am not responsible for anything stupid you may end up doing****
1. Introduction
2. FAQ;s
3. What You Need
4. How To
5. Protection
6. Why To Do It
7. Hacker Ethics/Code
_____________________________________________________________________
1. Introduction
Welcome to the wonderful world of trojan hacking, for those of you whodon't know what trojan hacking is, trojan hacking is simply the use ofa program to gain access to another persons computer. Hence this isnot true hacking. True hacking involves massive codes, passwords, andsomething most good hackers like to call UNIX, yes for almost a yearand a half I was a Trojan hacker, but now I'm a good 2 years intostudying and understanding UNIX. This Volume which, yes, was written onthe first day of the year 2000, involves the use of the program Netbus.Which is probably the most commonnly used trojan of our day. This wasgeared to be a guide with which you could easily take netbus and a fewother resources, and get into other persons computers.
2. FAQ's
1 - To get into anothers computer, both computers must be turned on, andonline2 - Yes this program does sometimes screw up, just turn it off and backon again3 - Unless you have actually paid for the Trojan, you do have an Illegalcompy4 - There must be a remote program installed on the other persons compbefore you will be able to connect to it5 - If you actually read all of this, you either a newbie, or an idiot
3. What You Need
Well first you need the trojan of the day, Netbus, and yes you couldtype that word in on almost any search engine, and viola you havehundreds of answers to your query, I will also provide you with a gooddownload spot which is on one of my friends domains, so that it probablywon't be removed for a few years. You'll also need an IP sniffer whichI will tell you more about later.
Downloads:
http://www.starwarshq.com/netbus17.ziphttp://www.starwarshq.com/sniffer.zip
***If those don't work try changing the files to all caps, or just theextensions as caps, if neither work they aren't there no more, so justgo to altavista or something***
4 - How To
How to? How to what hack, yeah thats it. Netbus once you click onNetubus.exe up pops this little window with all kinds of buttons, readthem if you want, now the part were gonna concentrate on is the placewhere it says 'Host name/IP', well this is where everything comes down,this is where you type in the person (or computers) IP number you wishto get into. But then your sitting there thinking, wait a minute I don'tknow what my friends IP is, well thats where the Sniffer program I toldyou about earlier comes into play at.
ICQ you know what it is 60% of the people who are online have ICQ, ifyou want to hack your friends, you'll need this, ICQ serves two purposesone it tells you whether or not your friends are online, and two itgives the all useful thing called a UIN number, which is there usernumber on ICQ, you can find it after clicking on there name, and findingout all of there information (and yes sometimes, under there informationyou will see there IP address), but most of the time you won't see thereIP address, so put there UIN number into the ICQ IP Sniffer which youshould have downloaded by now. And again viola you have there IP.
Now you see that second thing that says 'Port', well for the most partthats just there to be annoyying, but sometimes it comes in handy, butI'll talk about that in a latter volume. So you have the IP, and yourready to hit the 'Connect' button. Well no your not, you know when youdownloaded that Nebus17.zip, well theres a program called Patch.exe,well do you, that program has to have been run on the other personscomputer, yep it has to have been run on ther comp, physically executedby the other guy. Now there are a lot of ways to do this, just thinkabout them, you could actually be there friend, and be over there houseenough that you could sneakily do it, or when giving them a program tellthem to run it as an update or something (You can rename it to anythingyou want you know).
Once the program is on there computer, you've got there IP, you hit theconnect button, and again viola you are now inside that persons computerwow, you just got into somebody's computer. I'm not gonna botherexplaining what all of those buttons do, they are pretty much selfexplanatory after this point.
5 - Protection
You may want to take this to heart yourself, there is a program out therecalled Netbuster, which detects the Patch.exe after its been ran, andgets rid of it, which leaves you powerless to gain access again. Thereare other programs that will password protect machines against trojansas well. When this happens, most of the time the Trojan Hacker is uselessand this is where the true hacker takes over in the quest for information.
6-7- Why to do it, and Ethics
Well here's the end, you may get into other peoples computers just tofreak them out by opening there Cd rom tray dozens of times. But youtake it past the point of hacking, and of morals when you begin to dodamage to there computer.
1. Don't alter or delete any files, other than those to protect yourself2. DO NOT hack government computers3. Yes you can be traced if your not careful, so please take head
The Hacker Manifesto
This is our world now... the world of the electron and the switch,the beauty of the baud. We make use of a service alreadyexisting without paying for what could be dirt-cheap if it wasn'trun by profiteering gluttons, and you call us criminals. Weexplore... and you call us criminals. We seek after knowledge...and you call us criminals. We exist without skin color, withoutnationality, without religious bias... and you call us criminals.You build atomic bombs, you wage wars, you murder, cheat, andlie to us and try to make us believe it's for our own good, yetwe're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime isthat of judging people by what they say and think, not what theylook like. My crime is that of outsmarting you, something thatyou will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this in dividual, but you can't stop us all... after all, we're all alike.

***Look for more tutorials to come ie Tutorial Volume 2 and Volume 3***



Source: NIT Warangal Hostel LAN

5 comments:

  1. good info dude

    but i think ahcking or cracking is against google adsense TOS!

    ____
    www.linksfilms.blogspot.com

    ReplyDelete
  2. man...ICQ sniffer costs..and the link u gave is broken..

    help help??

    ReplyDelete
  3. for ICQ sniffer do this

    Copy following string as it is n past in Google search present on this page only...

    "parent directory" ICQ sniffer.exe

    N u'll get the links for free download....

    Njoy!! if ne probs tell me...

    ReplyDelete
  4. No need to use your hacking skills.

    You can use the guide in this following site to get you own Rapidshare Premium account for FREE.

    Just click here
    http://adbux-click-to-earn.blogspot.com/

    ReplyDelete
  5. No need to use your hacking skills.

    You can use the guide in this following site to get you own Rapidshare Premium account for FREE.

    Just click here
    http://top-earner.blogspot.com/

    ReplyDelete