<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7846611742988552626</id><updated>2024-11-01T20:01:57.856+08:00</updated><category term="Backtrack 5"/><category term="Crypters/Binder"/><category term="SQL"/><category term="Hacking Tools"/><category term="Keyloggers"/><category term="Phishing"/><category term="Rats (Remote Administrative Tool)"/><category term="Rats(Remote Administrative Tools)"/><category term="C++ for beginner"/><category term="Cracking Tools"/><category term="Crypters/Binders"/><category term="Linux"/><category term="Mobile"/><category term="PHP"/><category term="Rats(Remote Administration Tool)"/><category term="Rats(Remote Administration Tools)"/><category term="Rats(Remote Administrative Tool)"/><category term="TUTORIAL"/><category term="VPN(Virtual Private Network)"/><category term="WEB HACKING"/><title type='text'>KING OF HACKERS</title><subtitle type='html'>Learn Ethical Hacking and Copy Paste</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default?start-index=26&amp;max-results=25'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>34</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-431935165172119506</id><published>2011-07-26T08:00:00.000+08:00</published><updated>2011-07-26T08:00:03.337+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>Secure Sockets Layer (SSL) - An Introduction</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9BGVgVSt_zpJFlbROQqTvbgR03WZ7LPyUP6twdYYPWZ3LydR_tC1vnzUQaO3OESy8CH-0BY4v2nO_gSRBfdSdXVYAVE84kKTp9YRxs-iihMBM9Z5ywvgrTUKPMv3Kca-8VGYrXfNrLPU6/s1600/ssl.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9BGVgVSt_zpJFlbROQqTvbgR03WZ7LPyUP6twdYYPWZ3LydR_tC1vnzUQaO3OESy8CH-0BY4v2nO_gSRBfdSdXVYAVE84kKTp9YRxs-iihMBM9Z5ywvgrTUKPMv3Kca-8VGYrXfNrLPU6/s1600/ssl.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;&quot;&gt;In  the OSI model a reference model for effective communication we find a  layer named transport layer. Just like a physical layer (where viruses  attack normally) transport layer also need some sort of security because  transport layer is responsible for transmission of data.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 20px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;So what actually makes transport layer to make the transmission secure and to protect the data from any intruder.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/06/secure-sockets-layer-ssl-introduction.html&quot; name=&quot;more&quot; style=&quot;text-decoration: underline;&quot;&gt;&lt;/a&gt;Have you ever noticed that when you visit some website it starts with&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;http://&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;and whenever you visit some sort of money transfer and other important websites you find&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;https://&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;point  is clear https means a secure communication it means that your data  that transfer from this connection secure by using some cryptography  techniques.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;u&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/u&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;SSL  or secure sockets layer are cryptographic protocols that provide secure  communication over the Internet. So what actually a cryptography is &quot;  Cryptography is a science of secrete communication&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;SSL  uses two keys to encrypt data − a public key known to everyone and a  private or secret key known only to the recipient of the message.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;HTTP VS HTTPS&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqLibEgwMZeFBSKgoVbtW8dog5lS0zQS-loxSQROqlRHreKoDE5GESc040vqAFVa-2tE9WyurGTI38wqaI-DdoHNZoQR9rG4ZqqziX9kR36X1teY5-RziDU5xme-0unx6yIMgrRcdEjGg/s1600/0311-https-1.png&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; text-decoration: underline;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqLibEgwMZeFBSKgoVbtW8dog5lS0zQS-loxSQROqlRHreKoDE5GESc040vqAFVa-2tE9WyurGTI38wqaI-DdoHNZoQR9rG4ZqqziX9kR36X1teY5-RziDU5xme-0unx6yIMgrRcdEjGg/s400/0311-https-1.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The above picture shows that when&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;ALICE&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;sends  the confidential information over insecure channel that there is a  chance to sniff this confidential information (it might be a credit card  information or may be your password etc). So the point is that an  attacker can easily sniff this data and can easily read, understand and  use for illegal activities because the data transfer in plain text  regardless of any encryption it is simply a&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;HTTP&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;connection.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit92bWRUvRt934KyTuGEna3VFzXNrW8vSZTraIA-jBzRPb-9syhl_DMNQbKbPAZktjvjemPYbxxDBzKPofXRGrTTyih3pnDoIFD9selipSy8g5LqlrwgF7WP4LrGfcQAI6fybcKINkBc4/s1600/https1.jpg&quot; style=&quot;color: black; margin-left: 1em; margin-right: 1em; text-decoration: underline;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit92bWRUvRt934KyTuGEna3VFzXNrW8vSZTraIA-jBzRPb-9syhl_DMNQbKbPAZktjvjemPYbxxDBzKPofXRGrTTyih3pnDoIFD9selipSy8g5LqlrwgF7WP4LrGfcQAI6fybcKINkBc4/s400/https1.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Now  consider the second picture when an user send some sort of information  over secure channel means if someone using HTTPS than the data first  encrypt by using cryptography technique than it sends over channel, so  in this case if someone sniff this data than he/she not able to  understand it.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The  above broad picture has clearly shows that HTTPS is secure, but how  HTTPS is secure? Because it uses secure sockets layer (SSL). A website  can implement HTTPS by purchasing an SSL Certificate.&lt;br /&gt;
&lt;br /&gt;
Where there&#39;s a will there&#39;s a way. By following this amazing quote some  researcher has discovered some ways to crack/hack SSL certificate too.  To hack SSL certificate we will post an article later on.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/431935165172119506/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/secure-sockets-layer-ssl-introduction.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/431935165172119506'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/431935165172119506'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/secure-sockets-layer-ssl-introduction.html' title='Secure Sockets Layer (SSL) - An Introduction'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9BGVgVSt_zpJFlbROQqTvbgR03WZ7LPyUP6twdYYPWZ3LydR_tC1vnzUQaO3OESy8CH-0BY4v2nO_gSRBfdSdXVYAVE84kKTp9YRxs-iihMBM9Z5ywvgrTUKPMv3Kca-8VGYrXfNrLPU6/s72-c/ssl.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-668538015497760791</id><published>2011-07-25T19:00:00.000+08:00</published><updated>2011-07-25T19:00:02.033+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 5"/><title type='text'>Hacking Windows Using Social Engineering Toolkit and Backtrack 5</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTyHUXdROPBFg4ATtoBIrevZcYqMyZJXNOKjxBo5oj3EM7Jc1SbFGr2T5Exx3CSeq6dB1bBCo4ad8ExSX__xKxWn0vDz1al3HCaYGkEzoVwdofSEqX6mfx0QvA3sshjSjoa2OXPMMFsLzp/s1600/1swNNb.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;319&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTyHUXdROPBFg4ATtoBIrevZcYqMyZJXNOKjxBo5oj3EM7Jc1SbFGr2T5Exx3CSeq6dB1bBCo4ad8ExSX__xKxWn0vDz1al3HCaYGkEzoVwdofSEqX6mfx0QvA3sshjSjoa2OXPMMFsLzp/s320/1swNNb.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;What is Social Engineering Toolkit ?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The  Social-Engineer Toolkit (SET) is specifically designed to perform  advanced attacks against the human element. SET was designed to be  released with the&lt;/span&gt;&lt;a href=&quot;http://www.social-engineer.org/&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;http://www.social-engineer.org&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;  launch and has quickly became a standard tool in a penetration testers  arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help  from the community it has incorporated attacks never before seen in an  exploitation toolset. The attacks built into the toolkit are designed to  be targeted and focused attacks against a person or organization used  during a penetration test.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Actually  this hacking method will works perfectly with DNS spoofing or Man in  the Middle Attack method. Here in this tutorial I’m only write how-to  and step-by-step to perform the basic attack, but for the rest you can  modified it with your own imagination. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;In this tutorial we will see how this attack methods can owned your computer in just a few steps…&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The  success possibility of this attack depend on victim browser. If the  victim never update their browser, the possibility can be 85% or more.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Requirement :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1. &lt;/span&gt;&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/05/backtrack-5-download.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Backtrack 5&lt;/span&gt;&lt;/a&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;or&lt;/span&gt; &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/04/backtrack-4-r2-release-full-dvd.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Backtrack 4&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step By Step :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1. Change your work directory into /pentest/exploits/set/&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfPSuKzV3gZvgoy7rYbEYzXJ9eUp8q_1zXsTFcLypUKc0G0h35sFwaurA8g2jzpT2NFSuU_QPnA0aMpHJMazM74Npgh1bL6WOYiKUtnGzX7i_eNHQc0QdziW-nPP6idS3f6WYdg0eIdmb-/s1600/1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfPSuKzV3gZvgoy7rYbEYzXJ9eUp8q_1zXsTFcLypUKc0G0h35sFwaurA8g2jzpT2NFSuU_QPnA0aMpHJMazM74Npgh1bL6WOYiKUtnGzX7i_eNHQc0QdziW-nPP6idS3f6WYdg0eIdmb-/s1600/1.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2.  Open Social Engineering Toolkit (SET) ./set and then choose &quot;Website  Attack Vectors&quot; because we will attack victim via internet browser. Also  in this attack we will attack via website generated by Social  Engineering Toolkit to open by victim, so choose &quot;Website Attack  Vectors&quot; for this options.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigiS9J_QzHdLfSgHL0u6sJnPaX9DxG3It3CVs3p_bEMfOawmWRV8RWZRtXXdSJTMGE4HwkFCvOwxSFjb4OoIuWvZeUaSnSa35rS9ah7y6YBmm5QB4oXnE9wxZHWHm1QLAYjKm8yEDEbB9P/s1600/2.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigiS9J_QzHdLfSgHL0u6sJnPaX9DxG3It3CVs3p_bEMfOawmWRV8RWZRtXXdSJTMGE4HwkFCvOwxSFjb4OoIuWvZeUaSnSa35rS9ah7y6YBmm5QB4oXnE9wxZHWHm1QLAYjKm8yEDEbB9P/s1600/2.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;3.  Usually when user open a website, sometimes they don&#39;t think that they  are opening suspicious website that including malicious script to harm  their computer. In this option we will choose &quot;The Metasploit Browser  Exploit Method&quot; because we will attack via victim browser.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ_FZrwZTXSkXwyZsbzs7lS5htBcHWIskCmdNO5CexYBPGrmK74o-EC-T5Dx2SuoxLIKLJS5YvcFtwVz5hkCnZQrjL4Y3jT_HjrtUJaoX1xNvhhuAKabXgzINgiRtJpxnRKO5uT2qf7iB/s1600/3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwZ_FZrwZTXSkXwyZsbzs7lS5htBcHWIskCmdNO5CexYBPGrmK74o-EC-T5Dx2SuoxLIKLJS5YvcFtwVz5hkCnZQrjL4Y3jT_HjrtUJaoX1xNvhhuAKabXgzINgiRtJpxnRKO5uT2qf7iB/s1600/3.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;4.  The next step just choose &quot;Web Templates&quot;, because we will use the most  famous website around the world that already provided by this Social  Engineering Toolkit tools.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK5xFqAUWEGVJphbbNpqz572Dd3wnhiC5MG62rEVYOfChpP-s3_BYXP04jW2y95xMEv29nyTUH9rTdt6-jHB0ym5xK1U6i1ZY7Cn_GZG5GhBLuCedlkyvpiS3gAdsQysiCIDcTAHKzNfQG/s1600/4.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgK5xFqAUWEGVJphbbNpqz572Dd3wnhiC5MG62rEVYOfChpP-s3_BYXP04jW2y95xMEv29nyTUH9rTdt6-jHB0ym5xK1U6i1ZY7Cn_GZG5GhBLuCedlkyvpiS3gAdsQysiCIDcTAHKzNfQG/s1600/4.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;5.  There are 4 website templates Ready To Use for this attack methods,  such as GMail, Google, Facebook, and Twitter. In this tutorial I will  use Google, but if you think Facebook or Twitter more better because  it&#39;s the most accessed website, just change into what do you want.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0SdqFNdgSbNaE78UMXshzI5B7JURTS2ppeT7riBDrcz2OGdQ_YNSz86uU66j3TSnDDGcrdZACD7UvLljSiSCmQIyPFXj1DqkQ1600PW55w1K3MzrSuSUqBDW_xYnXxaWQrO-rjAtEwMSQ/s1600/5.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0SdqFNdgSbNaE78UMXshzI5B7JURTS2ppeT7riBDrcz2OGdQ_YNSz86uU66j3TSnDDGcrdZACD7UvLljSiSCmQIyPFXj1DqkQ1600PW55w1K3MzrSuSUqBDW_xYnXxaWQrO-rjAtEwMSQ/s1600/5.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;6.  For the next step…because we didn&#39;t know what kind of vulnerability  that successfully attack the victim and what type of browser, etc, in  this option we just choose &quot;Metasploit Browser Autopwn&quot; to load all  vulnerability Social Engineering Toolkit known. This tools will launch  all exploit in Social Engineering Toolkit database.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsGVtC4oKCIKahRWpfcpcP4SyV9EsVJ52jJn0EtawRpIiEKZtlXVm5OzC5amjyn9HENjhmfSvRbLCqaKXZ2Kp0UFQqEfmWkKYHHKtCapkeWhb5eBaK3QBXFWJ4yyIBVeijXxub3c7BnKrx/s1600/6.jpg&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;442&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsGVtC4oKCIKahRWpfcpcP4SyV9EsVJ52jJn0EtawRpIiEKZtlXVm5OzC5amjyn9HENjhmfSvRbLCqaKXZ2Kp0UFQqEfmWkKYHHKtCapkeWhb5eBaK3QBXFWJ4yyIBVeijXxub3c7BnKrx/s640/6.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;7.  For payload options selection I prefer the most use Windows Shell  Reverse_TCP, but you also can choose the other payload that most  comfortable for you.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQcIOGBI4PsXDY2j-0PSqJt9UWzhjgP5QkmaV1337IZVda83s0wSp8cr4P0nAXWisO9ArgXsYAJQGLlb_HupPSsxst9XcPXDkzvblF_N1AQq7Tveb4DUz9qmj4U5ojlc1edVf_ORZ2QQZ2/s1600/7.jpg&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;349&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQcIOGBI4PsXDY2j-0PSqJt9UWzhjgP5QkmaV1337IZVda83s0wSp8cr4P0nAXWisO9ArgXsYAJQGLlb_HupPSsxst9XcPXDkzvblF_N1AQq7Tveb4DUz9qmj4U5ojlc1edVf_ORZ2QQZ2/s640/7.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;8.  The next step is set up the Connect back port to attacker computer. In  this example I use port 4444, but you can change to 1234, 4321, etc&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJHkUMKh8X6wt_LrlrHD5wtEkotQQSL3mCviGmCUM5C59SyL4D5ofzzLCL-tSWmuO1Jtu8xXzZCTjxVjCMKM1XtJCCeVF2IsQgalN9AgJekcVaVq4ZJ8U8jAx8xmqgv3tNra8XOFX3k6in/s1600/8.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJHkUMKh8X6wt_LrlrHD5wtEkotQQSL3mCviGmCUM5C59SyL4D5ofzzLCL-tSWmuO1Jtu8xXzZCTjxVjCMKM1XtJCCeVF2IsQgalN9AgJekcVaVq4ZJ8U8jAx8xmqgv3tNra8XOFX3k6in/s1600/8.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;9. The next step just wait until all process completed and also wait until the server running.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtdhmhfRneQKRdJymqhEr0W7yTN9K3yEm7XVxWNuHem3tntLAjVHnz2VHwUK_Mfu-rwOC8mDdgUBuQVka0eo1GtlsARTFxwr2uyxTGVXc8EGJ4LdogWfVurPNzka6KdnXJvLPjsXhw6SCC/s1600/9.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtdhmhfRneQKRdJymqhEr0W7yTN9K3yEm7XVxWNuHem3tntLAjVHnz2VHwUK_Mfu-rwOC8mDdgUBuQVka0eo1GtlsARTFxwr2uyxTGVXc8EGJ4LdogWfVurPNzka6KdnXJvLPjsXhw6SCC/s1600/9.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjX4-VBnUirvas4-rZfnyxgpNtlGgim9g_yIW0CUL-Q4G3N3MAEsUEcJOvXtRh_MkW3ChM_19Yon6wHaRi3gxXHgSVp_ZIUyG938tyI6ur6RjjlwFuD_tZRj9j4bVTu67jBbH8BVEL_D4rU/s1600/10.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjX4-VBnUirvas4-rZfnyxgpNtlGgim9g_yIW0CUL-Q4G3N3MAEsUEcJOvXtRh_MkW3ChM_19Yon6wHaRi3gxXHgSVp_ZIUyG938tyI6ur6RjjlwFuD_tZRj9j4bVTu67jBbH8BVEL_D4rU/s1600/10.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;10.  When the link given to user, the victim will see looks-a-like Google  (fake website). When the page loads it also load all malicious script to  attack victim computer.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSR5l4gKkglbfe1R4AI6UG60y1qkWajB6dF4V8GgcbVuvJn7kwdPUmz0j7TlX4Nf60JLnQwPd0pjJuv8ZuXe70FSJfRB064fUG08nH0Q3D9DftI9_yi53xLxfZ9GiVOGxTFL8I9eGNHYua/s1600/11.jpg&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;359&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSR5l4gKkglbfe1R4AI6UG60y1qkWajB6dF4V8GgcbVuvJn7kwdPUmz0j7TlX4Nf60JLnQwPd0pjJuv8ZuXe70FSJfRB064fUG08nH0Q3D9DftI9_yi53xLxfZ9GiVOGxTFL8I9eGNHYua/s640/11.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;11.  In attacker computer if there&#39;s any vulnerability in victim computer  browser it will return sessions value that mean the exploit successfully  attacking victim computer. In this case the exploit create new fake  process named &quot;Notepad.exe&quot;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfyCzYkHmgU9LFFJD48AgYuaEInwBxbZQkWASmPqb-cP3SRNCCR4tMl93zCznE06bRqBcUln9tSRpr8FzvmwBkOMCxjwFaglGiartolcMvNEpjO8t6uvKXQ3Ny6Q1w_atCwpdX7AwqoFV_/s1600/12.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfyCzYkHmgU9LFFJD48AgYuaEInwBxbZQkWASmPqb-cP3SRNCCR4tMl93zCznE06bRqBcUln9tSRpr8FzvmwBkOMCxjwFaglGiartolcMvNEpjO8t6uvKXQ3Ny6Q1w_atCwpdX7AwqoFV_/s1600/12.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-QswtxokYIyWWsDWKGkccrMqCqgXwFXtQaYOgo5_DYPF35_yYqbka21hl7ChxBANbGMYOD1IRAHn6zl9R6YENhLx2QIeiKQ1YUHoDjYIbXvROMob39ilBmsp5mO2er1EkxO2rJbBxyFeD/s1600/13.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-QswtxokYIyWWsDWKGkccrMqCqgXwFXtQaYOgo5_DYPF35_yYqbka21hl7ChxBANbGMYOD1IRAHn6zl9R6YENhLx2QIeiKQ1YUHoDjYIbXvROMob39ilBmsp5mO2er1EkxO2rJbBxyFeD/s1600/13.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;12.  To view active sessions that already opened by the exploit type  &quot;sessions -l&quot; for listing an active sessions. Take a look to the ID…we  will use that ID to connect to victim computer.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm7t30maSFkiR2Abf5WKWnYObSFxOz8M2FxA3BDkdpdCCKXCpxGLlrAqYZryCRw1NdKSP2tIqOkuMWhpWy7HOPivvIqHfyQRZcoXtnXGzTVGXef9IfDQMlVneCCXeZUNHMPcyNqUIl5iY4/s1600/14.jpg&quot; style=&quot;clear: left; display: inline !important; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgm7t30maSFkiR2Abf5WKWnYObSFxOz8M2FxA3BDkdpdCCKXCpxGLlrAqYZryCRw1NdKSP2tIqOkuMWhpWy7HOPivvIqHfyQRZcoXtnXGzTVGXef9IfDQMlVneCCXeZUNHMPcyNqUIl5iY4/s1600/14.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;13.  To interract and connect to victim computer use command &quot;sessions -i  ID&quot;. ID is numerical value that given when you do sessions -l. For  example you can see example in picture below.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG5QZaVujVlKpu3rT3wIyXget2p30fjnwBCLKQsC0KASsphnOK3Bjo64PZufGkCPOVDuszSatS-p0cnbkZNcmBPZgQmSHhT_okhIJGV3gXlAL0HFBQNI6zly8yG-_CWDQkXSQbYTaYcmEF/s1600/15.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG5QZaVujVlKpu3rT3wIyXget2p30fjnwBCLKQsC0KASsphnOK3Bjo64PZufGkCPOVDuszSatS-p0cnbkZNcmBPZgQmSHhT_okhIJGV3gXlAL0HFBQNI6zly8yG-_CWDQkXSQbYTaYcmEF/s1600/15.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;14.  Victim computer already owned. I&#39;m practice to create this tutorial  using Virtual Machine so it will not harm other computer and also you  can doing a lot of experience with your OS&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwaocm2oDGHKSbPwY3VfTDTJZsFXLZFOEM5qPgJtU8rclmB8RknIIHUD2eICa0eAH5dl4gu-yVbbW_z1kiomOqi1xtCxsIC0n_RUij9Sc0jKu2QvalQm-7nfk1O5Gn1-pli72o2MiIl-xn/s1600/16.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwaocm2oDGHKSbPwY3VfTDTJZsFXLZFOEM5qPgJtU8rclmB8RknIIHUD2eICa0eAH5dl4gu-yVbbW_z1kiomOqi1xtCxsIC0n_RUij9Sc0jKu2QvalQm-7nfk1O5Gn1-pli72o2MiIl-xn/s1600/16.jpg&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/668538015497760791/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/hacking-windows-using-social.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/668538015497760791'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/668538015497760791'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/hacking-windows-using-social.html' title='Hacking Windows Using Social Engineering Toolkit and Backtrack 5'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTyHUXdROPBFg4ATtoBIrevZcYqMyZJXNOKjxBo5oj3EM7Jc1SbFGr2T5Exx3CSeq6dB1bBCo4ad8ExSX__xKxWn0vDz1al3HCaYGkEzoVwdofSEqX6mfx0QvA3sshjSjoa2OXPMMFsLzp/s72-c/1swNNb.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-8472006845753928733</id><published>2011-07-25T08:00:00.004+08:00</published><updated>2011-07-25T08:00:01.418+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Crypters/Binder"/><title type='text'>Darkcomet Crypter</title><content type='html'>&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;b&gt;&lt;/b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPKOUA55gRNtn6vdBJNACIi4zecKt-lTCLwQkAPrhkQ8iXigT5zz-LxwC1Ip1tNshGhNA2Eq2MaNFtKZnFl27CuqO4uYg-0By0n6TYmi4eJlxLpiuUwXSj1D0Qcj6d9ptq_tWLHkIj16g/s1600/29qmvx3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPKOUA55gRNtn6vdBJNACIi4zecKt-lTCLwQkAPrhkQ8iXigT5zz-LxwC1Ip1tNshGhNA2Eq2MaNFtKZnFl27CuqO4uYg-0By0n6TYmi4eJlxLpiuUwXSj1D0Qcj6d9ptq_tWLHkIj16g/s320/29qmvx3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;b&gt;&lt;span style=&quot;color: green;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Add Icon For Fud Result working with all rats and stlrs&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;b&gt;&lt;span style=&quot;color: green;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;i&gt;File Info&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Report date: 2011-04-23 10:12:40 (GMT 1)&lt;br /&gt;
File name:&amp;nbsp;&lt;b&gt;darkcomet-crypter-exe&lt;/b&gt;&lt;br /&gt;
File size: 1167360 bytes&lt;br /&gt;
MD5 Hash: 703fd6381d6585a2d5bcb499d8ca7119&lt;br /&gt;
SHA1 Hash: cf2d12fd5cb1feb3cede887d3176d00bc1064b62&lt;br /&gt;
Detection rate:&amp;nbsp;4&amp;nbsp;on 10 (40%)&lt;br /&gt;
Status:&amp;nbsp;INFECTED&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Detections&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Avast -&lt;br /&gt;
AVG -&lt;br /&gt;
Avira AntiVir -&amp;nbsp;TR/Dropper.Gen&lt;br /&gt;
ClamAV -&lt;br /&gt;
Comodo -&lt;br /&gt;
Emsisoft -&amp;nbsp;HackTool.Win32.VB.jz!IK&lt;br /&gt;
F-Prot -&amp;nbsp;W32/VBTrojan.17!Generic&lt;br /&gt;
Ikarus -&amp;nbsp;HackTool.Win32.VB.jz&lt;br /&gt;
TrendMicro -&lt;br /&gt;
Zoner -&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Scan report generated by&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;
&lt;a href=&quot;http://novirusthanks.org/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;NoVirusThanks.org&lt;/span&gt;&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;color: blue; font-weight: bold;&quot;&gt;&lt;a href=&quot;http://adf.ly/1z5r7&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/8472006845753928733/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/darkcomet-crypter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/8472006845753928733'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/8472006845753928733'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/darkcomet-crypter.html' title='Darkcomet Crypter'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPKOUA55gRNtn6vdBJNACIi4zecKt-lTCLwQkAPrhkQ8iXigT5zz-LxwC1Ip1tNshGhNA2Eq2MaNFtKZnFl27CuqO4uYg-0By0n6TYmi4eJlxLpiuUwXSj1D0Qcj6d9ptq_tWLHkIj16g/s72-c/29qmvx3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-6644142218092431376</id><published>2011-07-25T00:30:00.005+08:00</published><updated>2011-07-25T00:30:01.116+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>The Difference Between HTTP and HTTPS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaJILUgYCB60plgrMkJMVvL2_7NDqZqojmijWPg6blI7CipxQrABz06_foXC6GbfBjFf-45av15fpcvrjRnCoksSJFeCVyH-eMp0o7IGzxBXuWiXPjzs1GvPvOOYk0NFbT7PCWXNgPBBjs/s1600/images.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaJILUgYCB60plgrMkJMVvL2_7NDqZqojmijWPg6blI7CipxQrABz06_foXC6GbfBjFf-45av15fpcvrjRnCoksSJFeCVyH-eMp0o7IGzxBXuWiXPjzs1GvPvOOYk0NFbT7PCWXNgPBBjs/s1600/images.jpg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;HTTPS : &lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Hyper  Text Transfer Protocol Secure HTTPS is combination of Hyper Text  Transfer Protocol and Secure Socket Layer protocol(SSL) / Transport  Layer Security(TLS) to provide encrypted communication between web  server and client. Usually HTTPS used for internet banking, payment  transaction, login page, etc. This protocol use port 443 for  communication.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKVHDgZ9IxwLV8THscl5r56o3eruMg1KuEEwgkOyi0P6SIt82MqhYwssj8h6l1CKh7d2vLRlEoOsFAlmIAdC0fQzRSuui8sx317crK9hBfqP2YFad4av38eBFsZZtA5qv7La9pRabxlgPi/s1600/http.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKVHDgZ9IxwLV8THscl5r56o3eruMg1KuEEwgkOyi0P6SIt82MqhYwssj8h6l1CKh7d2vLRlEoOsFAlmIAdC0fQzRSuui8sx317crK9hBfqP2YFad4av38eBFsZZtA5qv7La9pRabxlgPi/s200/http.jpg&quot; width=&quot;200&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;Website that already use this protocol is GMail.com, and also other websites such as PayPal, Amazon, etc.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Let&#39;s see the connection between our computer and web server when we made connection using HTTPS using netstat -an.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBgUholMyTEQO6cwrItW6v7EPIISCrOhAAWQGzC3EZhDUwCPrtx4hAmEYyo7JoCxpvYorVB8UQxQ5ryMz_KaIuUwcV5jQ_uqOMZM_uc26ni9zIma5SSJvalo5K1S-M7QTUurxQsukHffs/s1600/A.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;138&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBgUholMyTEQO6cwrItW6v7EPIISCrOhAAWQGzC3EZhDUwCPrtx4hAmEYyo7JoCxpvYorVB8UQxQ5ryMz_KaIuUwcV5jQ_uqOMZM_uc26ni9zIma5SSJvalo5K1S-M7QTUurxQsukHffs/s320/A.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9xX__KjvO3sM6RBqA56YtTlQTSwKtrbXv46lk6b2KTy3Iv7sJKPhXfvvOP9N_Czm06tlij1QObtmPWvzrHk9Ujxh8P8DMB04b5p9NFPh9xmxvfqaOGCwq_tV-U55C0PKN_fScjqouK9Ib/s1600/A.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;As we can see from the picture, client computer opened random local ports and open port 443 on server side. &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Are HTTPS (Hyper Text Transfer Protocol Secure) Secure?&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;To answer this question, let&#39;s see experiment below.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;In this experiment, there&#39;s 2 person in one wireless network BadGuy and NiceGuy. NiceGuy trying to open &lt;a href=&quot;http://gmail.com/&quot;&gt;http://gmail.com&lt;/a&gt; then login into it. In different place, BadGuy is in the same wireless network with NiceGuy as shown in the picture below :&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZyh9y_TgaFjutwoZnQcyBZojmugUpMdouLPihe3LrWSNY-4Zoq3PKczOhmBmEcHKwjoSyDjKkK_7SU2ocJ8OUOXIzzv8zL3lSlueiStMUiA06bR5Bw4fd2m4Wc-VxxqZJZQ-SFE2_waPV/s1600/B.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZyh9y_TgaFjutwoZnQcyBZojmugUpMdouLPihe3LrWSNY-4Zoq3PKczOhmBmEcHKwjoSyDjKkK_7SU2ocJ8OUOXIzzv8zL3lSlueiStMUiA06bR5Bw4fd2m4Wc-VxxqZJZQ-SFE2_waPV/s320/B.jpg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;When  BadGuy trying to capture all packet data to/from access point, it will  be different when NiceGuy using HTTPS for its connection. For more clear  description, lets see the image below when NiceGuy Input username and  password on GMail login page.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSlkHER59y3_xAvNdTROja648u61QO7mDEgDJei4qJZ4E7456pM-tPluFS1tCsRLZn09jmhmbMK8y9U_oOrk-8pwdQr9YGfHSNxNY1lDz1NSiOdfcTxeqMaQDFiXYOREh8hRNofgRGC2k/s1600/C.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSlkHER59y3_xAvNdTROja648u61QO7mDEgDJei4qJZ4E7456pM-tPluFS1tCsRLZn09jmhmbMK8y9U_oOrk-8pwdQr9YGfHSNxNY1lDz1NSiOdfcTxeqMaQDFiXYOREh8hRNofgRGC2k/s1600/C.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRa29KXdzUqW0gy3v9QAXv5ZN2NsvnPZx6-zIGGMQNXqgtezrOJfPzH5TWNaNLCq0j76J96F3ZCS8mZWUVXc_QPSvtJz0KaMtWg5g0qGkUuG3WV22xNl4oXcdB-gWIOhIdm9bIXFGlvpdt/s1600/C.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;as  you can see in above picture, it&#39;s use https:// for connection between  client and web server. Then we will see what BadGuy do after NiceGuy  using HTTPS for his connection. This BadGuy really like Wireshark, so he  try again to capture the data and hope there&#39;s something interesting  there.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzw9zOZumT3ifCDJD2eiGMwLrXAsdgG1c8OEx22dIpdf9cdivHmWDh20zXtTZABM0Uzov1cO4yc1ab-SgzKigfAqPAi7VquvEBka4GJAWQQllvJPzqF8XzG-SI8Bj2Sk5Z9oIjhjCVZXA/s1600/D.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;154&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzw9zOZumT3ifCDJD2eiGMwLrXAsdgG1c8OEx22dIpdf9cdivHmWDh20zXtTZABM0Uzov1cO4yc1ab-SgzKigfAqPAi7VquvEBka4GJAWQQllvJPzqF8XzG-SI8Bj2Sk5Z9oIjhjCVZXA/s320/D.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;BadGuy  didn&#39;t find plain data there, every data send to / send from server is  encrypted. The picture above is the login information(maybe) data that  has already captured by BadGuy, but I think BadGuy cannot break the  encrypted data only in a few days/months/year or maybe we can called  &quot;impossible&quot; (we still didn&#39;t know when the possible time to break into  it). &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;HTTPS Conclusion&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;Packet  data sent using HTTPS is encrypted, anyone cannot see the packet data  inside public network. That&#39;s why HTTPS usually used for banking or  transaction on internet, and also login page or other page need to  encrypt the data.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/6644142218092431376/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/difference-between-http-and-https.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6644142218092431376'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6644142218092431376'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/difference-between-http-and-https.html' title='The Difference Between HTTP and HTTPS'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaJILUgYCB60plgrMkJMVvL2_7NDqZqojmijWPg6blI7CipxQrABz06_foXC6GbfBjFf-45av15fpcvrjRnCoksSJFeCVyH-eMp0o7IGzxBXuWiXPjzs1GvPvOOYk0NFbT7PCWXNgPBBjs/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-7567420334114204338</id><published>2011-07-24T17:00:00.004+08:00</published><updated>2011-07-24T17:00:00.266+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats (Remote Administrative Tool)"/><title type='text'>XtremeRAT v2.7.1</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizEvyIpCiLyUASCDYeW-OgsikHt_HD8iSIzkAn5Nv0m6Nt1jWXEP_pEt21aE1r08szpnUtnI4Ry6wJXa4l2n6gpSzjP_i0-dADanZgsP4SXL5L7tnoThf7t7K_4xr2t-2pdyJusetHiSU/s1600/11ltzqc.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizEvyIpCiLyUASCDYeW-OgsikHt_HD8iSIzkAn5Nv0m6Nt1jWXEP_pEt21aE1r08szpnUtnI4Ry6wJXa4l2n6gpSzjP_i0-dADanZgsP4SXL5L7tnoThf7t7K_4xr2t-2pdyJusetHiSU/s320/11ltzqc.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-weight: bold; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This is a tool that allow you to control your computer from anywhere in world.&lt;br /&gt;
With full support to Unicode language, you will never have problem using this software.&lt;br /&gt;
Here you can find new updates, informations and tutorials about this software.&lt;br /&gt;
&lt;br /&gt;
Version 2.7 (18/05/2011) Last Update&lt;br /&gt;
&lt;br /&gt;
- Added USB Spreader.&lt;br /&gt;
- Added Mouselogger.&lt;br /&gt;
- Added upload files and execute directly.&lt;br /&gt;
- Webcam function changed.&lt;br /&gt;
- Some language corrections.&lt;br /&gt;
- Select webcam and desktop capture functions to start automatically.&lt;br /&gt;
- New method to identify your servers.&lt;br /&gt;
- Corrected some bugs using preview images in File Manager.&lt;br /&gt;
- Upload files to FTP server using File Manager.&lt;br /&gt;
- Corrected some bugs using grab passwords function.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:scan:&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;File Info&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Report date: 2011-05-20 17:48:33 (GMT 1)&lt;br /&gt;
File name:&amp;nbsp;cliente-exe&lt;br /&gt;
File size: 3517440 bytes&lt;br /&gt;
MD5 Hash: 86a349f2becb28bead0cabcfc4264579&lt;br /&gt;
SHA1 Hash: 4bffdda39c1f78edcb4c90a6a03756ca424f7&lt;br /&gt;
Detection rate:&amp;nbsp;1&amp;nbsp;on 6 (17%)&lt;br /&gt;
Status:&amp;nbsp;INFECTED&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Detections&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
AVG -&lt;br /&gt;
Avira AntiVir -&lt;br /&gt;
ClamAV -&lt;br /&gt;
Emsisoft -&lt;br /&gt;
TrendMicro -&lt;br /&gt;
Zoner -&amp;nbsp;TrojanDownloader.Delf.PYW&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Scan report generated by&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;
&lt;a href=&quot;http://novirusthanks.org/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;NoVirusThanks.org&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div style=&quot;margin-bottom: 20px; margin-left: 20px; margin-right: 20px; margin-top: 5px;&quot;&gt;&lt;div class=&quot;smallfont&quot; style=&quot;font: normal normal normal 11px/normal verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; margin-bottom: 2px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif; font-size: x-small;&quot;&gt;&lt;a href=&quot;http://adf.ly/1zMmz&quot;&gt;&lt;b&gt;DOWNLOAD&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/7567420334114204338/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/xtremerat-v271.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7567420334114204338'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7567420334114204338'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/xtremerat-v271.html' title='XtremeRAT v2.7.1'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizEvyIpCiLyUASCDYeW-OgsikHt_HD8iSIzkAn5Nv0m6Nt1jWXEP_pEt21aE1r08szpnUtnI4Ry6wJXa4l2n6gpSzjP_i0-dADanZgsP4SXL5L7tnoThf7t7K_4xr2t-2pdyJusetHiSU/s72-c/11ltzqc.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-3403863185215623273</id><published>2011-07-24T08:00:00.003+08:00</published><updated>2011-07-24T08:00:01.263+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats (Remote Administrative Tool)"/><title type='text'>xtreme rat v2.9</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQk3HpB67OhlOc5e-6fX13r1cSRgKzhCbC0lWd1fwOrDjZCAQX6W6VHQ3ki5EYcMbajzU8un1ByW4ELZWZMIGSbFbk_MctSET-PVouaQP9Le8bONepntqVmzZjpL42Ch6yFGKp-qSPCwk/s1600/35aj2wh.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQk3HpB67OhlOc5e-6fX13r1cSRgKzhCbC0lWd1fwOrDjZCAQX6W6VHQ3ki5EYcMbajzU8un1ByW4ELZWZMIGSbFbk_MctSET-PVouaQP9Le8bONepntqVmzZjpL42Ch6yFGKp-qSPCwk/s320/35aj2wh.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Version 2.9 (19/06/2011)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Here some changes since last version: Please, update your servers.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Corrected a bug in file manager using &quot;run with params&quot;.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Corrected error when open keylogger function.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added no injection option.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added option to select capture audio automatically.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added new special folders in file manager.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Corrected a tray icon bug.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added auto update function.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added a option to block connections from IP list.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Corrected flags problem.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Corrected chrome passwords.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Corrected a bug using download files in file manager.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added a button in file manager to update drives and network connections list.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added in file manager a new thumbnail preview function.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added CPU usage column in process manager.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added mass search files.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added a option to open directory of the selected process in process manager.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added a funny option into window manager: Crazy Window.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;- Added disconnect server option.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1zN8z&quot;&gt;&lt;b&gt;DOWNLOAD&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/3403863185215623273/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/xtreme-rat-v29.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/3403863185215623273'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/3403863185215623273'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/xtreme-rat-v29.html' title='xtreme rat v2.9'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQk3HpB67OhlOc5e-6fX13r1cSRgKzhCbC0lWd1fwOrDjZCAQX6W6VHQ3ki5EYcMbajzU8un1ByW4ELZWZMIGSbFbk_MctSET-PVouaQP9Le8bONepntqVmzZjpL42Ch6yFGKp-qSPCwk/s72-c/35aj2wh.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-452558734713445587</id><published>2011-07-24T00:30:00.001+08:00</published><updated>2011-07-24T00:30:00.259+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorial"/><title type='text'>How to Know if You Are Infected with RATs or Keyloggers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizhPTzI0DzJvguYjjVgsodwum-9-x7hvsGv1bK3yNrkyWn5DzBuNe6C5h-x5lAZkXop2AYlRSdxsMV_0pUcolg6RzFTfQ_zHYMBT8X1RVJnPqWMQGgyaoRpkDjZxgBylo_S5NWMfoxRZsT/s1600/isitsafe.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizhPTzI0DzJvguYjjVgsodwum-9-x7hvsGv1bK3yNrkyWn5DzBuNe6C5h-x5lAZkXop2AYlRSdxsMV_0pUcolg6RzFTfQ_zHYMBT8X1RVJnPqWMQGgyaoRpkDjZxgBylo_S5NWMfoxRZsT/s320/isitsafe.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;How to Know if You Are Infected with&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Rats%20%28Remote%20Administrative%20Tool%29&quot;&gt;RATs&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;Keyloggers&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
In this post i am going to show you how to find out when you are infected with a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Rats%20%28Remote%20Administrative%20Tool%29&quot;&gt;RAT&lt;/a&gt; or&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;Keylogger&lt;/a&gt;&amp;nbsp;without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Rats%20%28Remote%20Administrative%20Tool%29&quot;&gt;RAT&lt;/a&gt; or a&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;Keylogger&lt;/a&gt;&amp;nbsp;work, which would mean, if you are not connected to internet, you don&#39;t have to worry about being infected with&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Rats%20%28Remote%20Administrative%20Tool%29&quot;&gt;RAT&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;Keylogger&lt;/a&gt;&amp;nbsp;Ok,  so for those who have internet connection and think they are being  infected with a Trojan, here is a little guide that can solve your  problem.&lt;br /&gt;
&lt;br /&gt;
1. Now every program has their own process which can be seen on task  manager. So the first thing to do is to find out which process the&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;Trojan&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;is being attached to. If you see some unknown&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;process  search that on google. A good hacker will always makes sure he hides  its process with a Windows based Process, for eg. svchost.exe or  something like that.&lt;br /&gt;
&lt;br /&gt;
2. If you cant find, then the next thing you can do is use cmd&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: darkslateblue;&quot;&gt;(to open cmd prompt,&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: darkred;&quot;&gt;Click on Start---&amp;gt;Accessories--&amp;gt;Command prompt).&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;3. Once Command Prompt is opened, use this command:&lt;/span&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #45818e;&quot;&gt;netstat -an |find /i &quot;listening&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: darkred;&quot;&gt;Note:&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool!&lt;br /&gt;
&lt;br /&gt;
Now we wonder What this Command does?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: navy;&quot;&gt;This command will show all the opening ports. Now check for any unknown port.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;4. You can skip step 3 if you want, and can do this instead.&lt;br /&gt;
&lt;br /&gt;
Open command prompt and type&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;color: blue;&quot;&gt;netstat -b&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnxD-lxS9VE5hm8eSevYzWN_whHWJu6OuxBZWOt6fPuH1H6EGECMcPpEk5ocTaoURHk08cYJZOjLiaHfvk7B2fxv4JQXad5owGhptWM0AN4zIcVCUvAAuTEz_ozz63j-pHkSjVSLfu7r4v/s1600/netstat+-b.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnxD-lxS9VE5hm8eSevYzWN_whHWJu6OuxBZWOt6fPuH1H6EGECMcPpEk5ocTaoURHk08cYJZOjLiaHfvk7B2fxv4JQXad5owGhptWM0AN4zIcVCUvAAuTEz_ozz63j-pHkSjVSLfu7r4v/s1600/netstat+-b.jpeg&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.&lt;br /&gt;
Look out for SYN Packets and the Foreign address its been connecting  with , check the process its been associated with, check the ports also.  If you find that its connecting to some unknown ports, then you can say  you have been backdoored.&lt;br /&gt;
&lt;br /&gt;
5. Go to your task manager. On the top of it,&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #45818e;&quot;&gt;click on View---&amp;gt; select Column---&amp;gt; Tick on PID (Process Identifier).&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Match the suspicious Process with the Processes In task manager, check PID also.&lt;br /&gt;
&lt;br /&gt;
Now most of the &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Rats%20%28Remote%20Administrative%20Tool%29&quot;&gt;RATs&lt;/a&gt; resides on Start up. How to delete them from start up?&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: darkred;&quot;&gt;a) Go to regedit ---&amp;gt; HKLM\Software\Microsoft\Windows\Current version\Run&lt;br /&gt;
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at&lt;br /&gt;
HKCU\Software\Microsoft\Windows\Current Version\Run&lt;br /&gt;
OR&lt;br /&gt;
Open Cmd prompt &amp;amp; type start msconfig. Go to Startup tab, you can check the startup process there.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: darkred; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGUKyJFoev-cKl8Vu-PUVpxITRq3ZNLt2QzMCE-1Xlaw66ywMIVMSPS1Qm2QfCWWy1qV9p-hwF3HcTc5eoXndMRPhLvxeFteYXUm8qpvTsPKnW32Celev9KrRkGiR5LPwZxLc2Wq5q5zSj/s1600/startup.jpeg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;44&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGUKyJFoev-cKl8Vu-PUVpxITRq3ZNLt2QzMCE-1Xlaw66ywMIVMSPS1Qm2QfCWWy1qV9p-hwF3HcTc5eoXndMRPhLvxeFteYXUm8qpvTsPKnW32Celev9KrRkGiR5LPwZxLc2Wq5q5zSj/s320/startup.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
I hope This Tutorial was easy and comprehensive.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/452558734713445587/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/how-to-know-if-you-are-infected-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/452558734713445587'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/452558734713445587'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/how-to-know-if-you-are-infected-with.html' title='How to Know if You Are Infected with RATs or Keyloggers'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizhPTzI0DzJvguYjjVgsodwum-9-x7hvsGv1bK3yNrkyWn5DzBuNe6C5h-x5lAZkXop2AYlRSdxsMV_0pUcolg6RzFTfQ_zHYMBT8X1RVJnPqWMQGgyaoRpkDjZxgBylo_S5NWMfoxRZsT/s72-c/isitsafe.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-490724387074234260</id><published>2011-07-23T22:00:00.005+08:00</published><updated>2011-07-23T22:00:08.417+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats(Remote Administration Tool)"/><title type='text'>Albertino Advanced RAT &amp; Binder v4.2</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfGRH_yTLE7XMJHQ51-lHwPyicRdUQbTH7oYH4WiLk4NXEpBgFxY5y0uo5tyYtQNzkTWjzNKprc28D6nu6NhcmsO2WvWIhZNrjFtL5wFFMDOuz_HDsn1Ojiyj1UHOYFxdRjcvshN9_Yc0/s1600/2l9m5wh.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;310&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfGRH_yTLE7XMJHQ51-lHwPyicRdUQbTH7oYH4WiLk4NXEpBgFxY5y0uo5tyYtQNzkTWjzNKprc28D6nu6NhcmsO2WvWIhZNrjFtL5wFFMDOuz_HDsn1Ojiyj1UHOYFxdRjcvshN9_Yc0/s320/2l9m5wh.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0aIydMePwa8HPs1bmpizz262BP4QWHrxJlQLKq14SYc0CNBISVSUWLuVacK-T4XcFV9BevnZMaZx44iBvuuuhoNBEJHeZh8ysaN1JEaWuOkU21NfWTnNTdgO4J8lRQoign-sQshmkRkg/s1600/2n7eepu.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;203&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0aIydMePwa8HPs1bmpizz262BP4QWHrxJlQLKq14SYc0CNBISVSUWLuVacK-T4XcFV9BevnZMaZx44iBvuuuhoNBEJHeZh8ysaN1JEaWuOkU21NfWTnNTdgO4J8lRQoign-sQshmkRkg/s320/2n7eepu.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Features:&lt;/span&gt;&lt;/div&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;[*]Polymorphic  STUB[*]Flags[*]Multi-Tasking (Control all features on same client  simultaneously.)[*]Reverse Connection (Connect Behind Routers)[*]UPnP  Manager (Run RAT without port forwarding) (on most  routers)[*]Multi-Clients Management (Control few clients  simultaneously)[*]Remote Client Information (Basic client info)[*]Last  25 visited web pages[*]Send Fake Messages[*]Funny Stuff (Hide Desktop  Icons, Hide Start Button, Hide Task Bar, Open-Close CD-Rom, Flip Screen,  Swap Mouse buttons, Lock CTRL+ALT+DEL and more)[*]IE Options (Get  Version, Change Home Page, Change IE Title, Open Website.)[*]Control  Panel (Shutdown PC, Restart PC, Logoff User)[*]Clipboard Manager (Get  Clipboard, Set Clipboard, Clear Clipboard.)[*]Remote Server Download  (Download files and execute them.)[*]Printer Manager (Print to Default  Printer)[*]File Manager (Download and Upload Locally, Execute, Delete  File, Delete Folder, Make Folder, Rename, File Size)[*]Search Files  (Search for any file or type on remote PC.)[*]Keylogger (Get all  keystrokes from remote PC.)[*]Remote Passwords (FF 2,3 and 3.5+, IE7-8,  Chrome, MSN (+Live Messenger), Trillian, IMVU, Pidgin, No-IP, DyDNS,  FileZilla, Outlook (no drops or external references))[*]Processes  Manager (List all running processes with the ability to close  selected.)[*]Services Manager (List all services, Stop-Start Service,  Disable-Manual-Autostart Service.)[*]Windows Manager (Control Opened  Windows (Close, Hide, Minimize, Maximize, Restore, Default, No  Active))[*]Remote Desktop (Watch Live Remote Desktop with ability to  change Image Quality, Remote Control and many others))[*]Remote WebCam  (Watch Live Remote WebCam (Save capture as video to file as XVID, DIVX  and others))[*]Registry Editor (List, Create, Edit, Delete registry  keys)[*]Send to All (Download and run file from website to all clients,  Upload and run file from your PC to all clients, Run a DDOS (small  bot))[*]Command Prompt Line (Manage remote cmd as your own.)[*]Client  Geo Location[*]Multi Binder Included. (New polymorphic technology  method)[*]Icon Changer[*]Assembly Editor&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1zORc&quot;&gt;&lt;b&gt;DOWNLOAD&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/490724387074234260/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/albertino-advanced-rat-binder-v42.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/490724387074234260'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/490724387074234260'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/albertino-advanced-rat-binder-v42.html' title='Albertino Advanced RAT &amp; Binder v4.2'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfGRH_yTLE7XMJHQ51-lHwPyicRdUQbTH7oYH4WiLk4NXEpBgFxY5y0uo5tyYtQNzkTWjzNKprc28D6nu6NhcmsO2WvWIhZNrjFtL5wFFMDOuz_HDsn1Ojiyj1UHOYFxdRjcvshN9_Yc0/s72-c/2l9m5wh.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-6623006736257967749</id><published>2011-07-23T08:00:00.002+08:00</published><updated>2011-07-23T08:00:03.163+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Keyloggers"/><title type='text'>Rapzo logger 1.8.2 Private Cracked</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSpJeNC-G-65AjfSXJUKu8gJI6ebE0kWhL2sRUBVTBi1Pfhyphenhyphenq3edycNvYpGobyW1vBVCoDQ8d8d73tu5ap5LmiNtneQpoLTXk1kvfzt-zor-6HeNRHKygfjIOjyyESd2BnuRicJ1kxDl8/s1600/main2m.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSpJeNC-G-65AjfSXJUKu8gJI6ebE0kWhL2sRUBVTBi1Pfhyphenhyphenq3edycNvYpGobyW1vBVCoDQ8d8d73tu5ap5LmiNtneQpoLTXk1kvfzt-zor-6HeNRHKygfjIOjyyESd2BnuRicJ1kxDl8/s320/main2m.png&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWS_9t2lmGp5rbGazWhGwGqMPI_m__oN-Gf9OvLgAreWE5WYMXahFsqMQ493RAtisaMU5CF6l9e6E9Q8WIIrPz2CKV9c8urkBuvRoQkH4MMA0z9qPsJs2-qF5inSXIOQuxSY2u7sbiv9qE/s1600/main2m.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;NVT Scam Result:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;display: inline !important; text-align: center;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;display: inline !important; text-align: center;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File Info&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Report date: 2011-03-14 10:04:43 (GMT 1)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File name:&amp;nbsp;&lt;b&gt;express-exe&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File size: 353280 bytes&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;MD5 Hash: 450b9c228262616aef4d7b0c3a5da1f2&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;SHA1 Hash: d5e489a2f9176b4d0cd47a43e4dab6a4d83eb019&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Detection rate:&amp;nbsp;5&amp;nbsp;on 9 (56%)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Status:&amp;nbsp;INFECTED&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Detections&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Avast -&amp;nbsp;Win32:Spyware-gen [Spy]&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;AVG -&amp;nbsp;Dropper.Generic3.NMD&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;ClamAV -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Comodo -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Emsisoft -&amp;nbsp;Trojan-Spy.MSIL!IK&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;F-Prot -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Ikarus -&amp;nbsp;Trojan-Spy.MSIL&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;TrendMicro -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Zoner -&amp;nbsp;Dropper.Generic3.NPG&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://novirusthanks.org/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;NoVirusThanks.org&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Scan report generated by&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: black; text-align: center; text-decoration: underline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/i&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://adf.ly/1zleq&quot;&gt;&lt;b&gt;Download&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/6623006736257967749/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/rapzo-logger-182-private-cracked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6623006736257967749'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6623006736257967749'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/rapzo-logger-182-private-cracked.html' title='Rapzo logger 1.8.2 Private Cracked'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSpJeNC-G-65AjfSXJUKu8gJI6ebE0kWhL2sRUBVTBi1Pfhyphenhyphenq3edycNvYpGobyW1vBVCoDQ8d8d73tu5ap5LmiNtneQpoLTXk1kvfzt-zor-6HeNRHKygfjIOjyyESd2BnuRicJ1kxDl8/s72-c/main2m.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-1899643312801737432</id><published>2011-07-23T00:30:00.002+08:00</published><updated>2011-07-23T00:30:02.677+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Crypters/Binders"/><title type='text'>HackHound Crypter</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT93NPtX4IYpKNjlQVo_R2JDIjWFfwWp8q8NGSIRsun5gI3kNFQXVsYL0u3QfBMEqtMIsnRDPxdUKK3_RW22QRI23loS-AkF2uRJg3JXE7qXDSlS4_ThalaKmbikqza1evYJFbtkwoCj5m/s1600/nedwuwu.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;298&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT93NPtX4IYpKNjlQVo_R2JDIjWFfwWp8q8NGSIRsun5gI3kNFQXVsYL0u3QfBMEqtMIsnRDPxdUKK3_RW22QRI23loS-AkF2uRJg3JXE7qXDSlS4_ThalaKmbikqza1evYJFbtkwoCj5m/s400/nedwuwu.jpg&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;File Info&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Report date: 2011-04-17.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Link to scan:&amp;nbsp;&lt;a href=&quot;http://myavscan.com/result.php?scan=MTU0NzY=&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;MyAvScan.com | Virus Scan Results for DSC104.exe&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File name:&amp;nbsp;&lt;b&gt;DSC104.exe&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File size: 384657 bytes&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;MD5 Hash: 9f56208325bd040a86be7a4a81b7bc2d&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;SHA1 Hash: 5eb7819403470c309d21017908c57376d610c9ea&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Detection rate:&amp;nbsp;0 out of 33&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Status:&amp;nbsp;CLEAN&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Detections&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;AVG -&amp;nbsp;Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Acavir -&amp;nbsp;Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Avast 5 -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Avast -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Avira -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;BitDefender -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;VirusBuster Internet Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Clam Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;COMODO Internet Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;DrWeb -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;eTrust-Vet -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;F-PROT Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;F-Secure Internet Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;G Data -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;IKARUS Security-Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Kaspersky Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;McAfee -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;MS Security Essentials -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;ESET NOD32 -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Norman -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Norton -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Panda Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;A-Squared Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Quick Heal Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Rising Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Solo Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Sophos -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Trend Micro Internet Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;VBA32 Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Vexira Antivirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Webroot Internet Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Zoner AntiVirus -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;AhnLab V3 Internet Security -Clean.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://myavscan.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;MyAvScan.com&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;Scan report generated by&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center; text-decoration: underline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;For thosee who said myavscan.com result is fake&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;here is Novirusthanks result of crypted cybergate&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File Info&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Report date: 2011-04-17 19:15:29 (GMT 1)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File name:&amp;nbsp;&lt;b&gt;dsc104-exe&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;File size: 384657 bytes&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;MD5 Hash: 9f56208325bd040a86be7a4a81b7bc2d&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;SHA1 Hash: 5eb7819403470c309d21017908c57376d610c9ea&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Detection rate: 0 on 10 (0%)&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Status:&amp;nbsp;CLEAN&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Detections&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Avast -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;AVG -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Avira AntiVir -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;ClamAV -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Comodo -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Emsisoft -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;F-Prot -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Ikarus -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;TrendMicro -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Zoner -&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i style=&quot;color: white;&quot;&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;&lt;a href=&quot;http://novirusthanks.org/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;NoVirusThanks.org&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;i&gt;&lt;div style=&quot;color: white; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: normal;&quot;&gt;&lt;i&gt;Scan report generated by&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: white; text-align: center; text-decoration: underline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center; text-decoration: underline;&quot;&gt;&lt;a href=&quot;http://adf.ly/1zjDi&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;DOWNLOAD&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #351c75; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #351c75; font-family: Arial,Helvetica,sans-serif;&quot;&gt;p-s-s-s : U2ZTVlR0U3VUNFdyZWZTa1N0Z2tlZlNz&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #351c75; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Crypted With ARMON-64--&amp;gt;ATOM-128--&amp;gt;B A S E-64 ( last without space)&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/1899643312801737432/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/hackhound-crypter.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1899643312801737432'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1899643312801737432'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/hackhound-crypter.html' title='HackHound Crypter'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiT93NPtX4IYpKNjlQVo_R2JDIjWFfwWp8q8NGSIRsun5gI3kNFQXVsYL0u3QfBMEqtMIsnRDPxdUKK3_RW22QRI23loS-AkF2uRJg3JXE7qXDSlS4_ThalaKmbikqza1evYJFbtkwoCj5m/s72-c/nedwuwu.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-1610992008589044971</id><published>2011-07-22T19:30:00.002+08:00</published><updated>2011-07-22T19:30:01.020+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>How To Hack eBay User ID and Password</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl3aPedjIPSQ5Kw5amGtsjzlrx55uUe25q-H2xmU-4_vSEQ54rXDOSj3dkAI5N6WrqsLKVvTEsH5xMFhVkShSq9dMFQ2zvTz2MhN3b9jjVFfUKQ4e5g_7n_OFlAJc7Bf-8OwNduAoxFm6E/s1600/make-money-on-ebay.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl3aPedjIPSQ5Kw5amGtsjzlrx55uUe25q-H2xmU-4_vSEQ54rXDOSj3dkAI5N6WrqsLKVvTEsH5xMFhVkShSq9dMFQ2zvTz2MhN3b9jjVFfUKQ4e5g_7n_OFlAJc7Bf-8OwNduAoxFm6E/s1600/make-money-on-ebay.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Today  i want to teach you how to hack an eBay account password. For this i&#39;ll  be using phishing. Phishing is one of the easiest ways to hack ANY  site&#39;s user names and passwords. You upload a fake Webpage that looks  like the legit one, then you send the link to your victim and trick him  into entering his login info into the fake Webpage, which then sends the  info to you. It&#39;s very simple and very effectively.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu25FgGvtnln8d2mQI9jmp4XT2uWtSMGvByhsP2AHl5kra_nRPlrOpBDAnqQhlVtqmRzks53HQhRQWJTTLb47PqxpLK4gIXGYx3c4W_iExp6d6bJNRdDT_-xUKEuyNNDySeN9CVy9J53g/s1600/ebay.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu25FgGvtnln8d2mQI9jmp4XT2uWtSMGvByhsP2AHl5kra_nRPlrOpBDAnqQhlVtqmRzks53HQhRQWJTTLb47PqxpLK4gIXGYx3c4W_iExp6d6bJNRdDT_-xUKEuyNNDySeN9CVy9J53g/s320/ebay.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;How to hack eBay account password&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; 1. First you need to&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://adf.ly/203by&quot;&gt;download&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: navy;&quot;&gt;eBay Phisher&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; 2. The downloaded file contains:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: darkred;&quot;&gt;* ebay.html&lt;br /&gt;
* ebaylogin.php&lt;br /&gt;
* log.txt&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
3. Now upload these three files to a free webhost site. You can try&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;a href=&quot;http://www.yourfreehosting.net/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;Your Free Hosting&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.t35.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Free Web Hosting&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.t35.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Reliable Free Hosting&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.t35.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;cPanel Hosting&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;a href=&quot;http://www.t35.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;T35 Hosting&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.110mb.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;FREE Website Hosting &amp;amp; Premium Web Hosting&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;a href=&quot;http://www.110mb.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;110mb.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://www.esmartstart.com/&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;www.esmartstart.com&lt;/a&gt;&lt;/span&gt; &lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; 4. After that send this phisher link (ebay.html) to your victim and make him login to his eBay account using your sent Phisher.&lt;br /&gt;
&lt;br /&gt;
5. Once he logs in to his eBay account using Phisher, all his typed eBay id and password is stored in&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;color: darkgreen;&quot;&gt;&quot;log.txt&quot;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: darkgreen;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY7FCVA-9O156BiO6tYcBF7hWKXZuARrsfxpI1h4lInRv5B6KEHLHxpHO6kWqF4Yq1R6Y9CmjW4x6b9vAKysqH_xBVZYn9QBJcjINXraMFGgBtfbG23LOkRHK2G4wsHU7wmsF8i3_1y10/s1600/ebayhost.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;78&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhY7FCVA-9O156BiO6tYcBF7hWKXZuARrsfxpI1h4lInRv5B6KEHLHxpHO6kWqF4Yq1R6Y9CmjW4x6b9vAKysqH_xBVZYn9QBJcjINXraMFGgBtfbG23LOkRHK2G4wsHU7wmsF8i3_1y10/s320/ebayhost.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt; &lt;br /&gt;
6. Now, open log.txt to get hacked eBay id and password as shown.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMzDBYd2UDY15v2OYhaXxY3V3jCtLN-BwajqJAdM-8RKmEILc7DkVI8gQzuxyEHmbAJgsTQNDWjUrxVfvrcRsIsw-sH_rkeeh5qsYAcZwIJu53wpYVHAjyQXEKCmuSu-wkEwNT7rnmCcTX/s1600/ebaypass.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMzDBYd2UDY15v2OYhaXxY3V3jCtLN-BwajqJAdM-8RKmEILc7DkVI8gQzuxyEHmbAJgsTQNDWjUrxVfvrcRsIsw-sH_rkeeh5qsYAcZwIJu53wpYVHAjyQXEKCmuSu-wkEwNT7rnmCcTX/s1600/ebaypass.png&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
Thats it. I hope this phishing tutorial is fullproof and you can now  hack eBay account password using eBay Phishing. I have tried to keep  this eBay phishing tutorial simple for you to hack eBay account  password. &lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/1610992008589044971/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/how-to-hack-ebay-user-id-and-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1610992008589044971'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1610992008589044971'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/how-to-hack-ebay-user-id-and-password.html' title='How To Hack eBay User ID and Password'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgl3aPedjIPSQ5Kw5amGtsjzlrx55uUe25q-H2xmU-4_vSEQ54rXDOSj3dkAI5N6WrqsLKVvTEsH5xMFhVkShSq9dMFQ2zvTz2MhN3b9jjVFfUKQ4e5g_7n_OFlAJc7Bf-8OwNduAoxFm6E/s72-c/make-money-on-ebay.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-5315899718340249134</id><published>2011-07-22T13:00:00.000+08:00</published><updated>2011-07-22T13:00:05.233+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>How to Hack Gmail Account Password ?</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Hi Friends , this is the best way to hack gmail account for passwords , tried it myself and worked!!!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #8e7cc3;&quot;&gt;Things That you Need for Hacking Gmail Account Password:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1. Gmail Phisher&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2. Free Web hosting Site&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;3. Little bit of manual Work&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #8e7cc3;&quot;&gt;Introduction to Phishing&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;If  you know little bit of Hacking then Its must for you know About  Phishing i.e What is Phishing and how it works and most important How  you can protect yourself from getting into the Trap. I will try to  explain all of these in my article.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;First of all What  are Phish pages and what is phishing?? Phish pages are basically the  fake pages or virtual pages that looks similar to the original website  Page. The only difference is the batch program running in the background  i.e Original Webpage sends requests to Gmail server while Phish Page  sends request to hacker&#39;s php server. Now Phishing is a password hacking  technique commonly used by hackers using phish pages that looks similar  to original web page. The only difference is the URL in the address bar  so Guys One Important Tip for you all always check the Address bar  while going to any website .&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Now What is Smart  Phishing, Normal phishing page sends the password to hacker but it  doesn&#39;t redirects the page to original website but smart phishing does.  Means victim can never know what really happened and his account is got  hacked. He will only think that he has entered the wrong password as in  second attempt the web page is original and he will be able to login and  the most fantastic thing is that the original redirected page has  username already entered in it that makes it even smarter.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Now lets come to  how it works?? When a user types a Username Password in the the text  box,The info is sent to &quot;login.php&quot; which acts as a password logger and  redirects the page to &quot;LoginFrame2.htm&quot; which shows &quot;There has been a  temporary error Please Try Again&quot; in it . So when the person clicks on  try again it redirects to the actual URL so that the victim does not  know that your site is a fake site and gets his gmail.com password  hacked.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #8e7cc3;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #8e7cc3;&quot;&gt;HACKING GMAIL ACCOUNT STEP WISE:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1. First of all download the Gmail Phisher.&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/1oAuE&quot; style=&quot;text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;DOWNLOAD&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2. Extract the rar file now you will get three files as given below:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;gmail.html&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;log.txt&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;mail.php&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
3. Upload all the Three files to any of the free Web hosting server.  Remember while creating the account on these servers try the username as  nearer as possible to the original URL like mail.gmaile or maile.gmall  etc.. As its the most crucial step. Some Free Web hosting servers are  given below you can also find few more for yourself.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/www.yourfreehosting.net&quot; style=&quot;text-decoration: none;&quot;&gt;www.yourfreehosting.net&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/www.esmartstart.com&quot; style=&quot;text-decoration: none;&quot;&gt;www.esmartstart.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/www.110mb.com&quot; style=&quot;text-decoration: none;&quot;&gt;www.110mb.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/www.drivehq.com&quot; style=&quot;text-decoration: none;&quot;&gt;www.drivehq.com&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/www.t35.com&quot; style=&quot;text-decoration: none;&quot;&gt;www.t35.com&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
4. Once you have uploaded all the three files to web hosting server now  you have to send these to your victim. This is the most important step  regarding smart phishing technique.&lt;br /&gt;
Most People use same password for orkut and gmail and here is the main  hack lies. What you have to do you have to send the HTML email to the  victim which looks similar to the Orkut scrap to his email you can  easily do this using simple editing to the existing mail. Just you have  to change the link with your phish link and content according to the  person likings so that he will surely come inside the trap.&lt;br /&gt;
Another technique is that you can send him a request to join a particular community in the format orkut does.&lt;br /&gt;
And Last but the most important one Send him mail from Gmail Admin such  that &quot;We have seen illegal activity from your account and you need to  verify your account and your account is temporarily disabled after this  login. To unlock your account Verify your Email and in that link put  your Phish link. Now Guys you all will came to know How it works. If you  want to Protect yourself its must that you should know what techniques a  Hacker can use to hack your Gmail Account.&lt;br /&gt;
&lt;br /&gt;
5. Now After sending phisher to victim, once the user logs in to his  Gmail account using your Phisher, his user ID and password are ours..And  these are stored in log.txt What you have to do is just refresh your  Web hosting account files.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSC9M-yeYnxZDySgvJQKCchTMUiAlNQz9OQe8bGtSSlxCbyFee9dNaeGtItFselLCdLrmcqtgUjnoj1NtBG3Ahn6vBwu45ujHJwZCYb-YzNIf0GWzRkbNPMODqU4ROcS8e_pC9PifTWltX/s1600/1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;61&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSC9M-yeYnxZDySgvJQKCchTMUiAlNQz9OQe8bGtSSlxCbyFee9dNaeGtItFselLCdLrmcqtgUjnoj1NtBG3Ahn6vBwu45ujHJwZCYb-YzNIf0GWzRkbNPMODqU4ROcS8e_pC9PifTWltX/s320/1.png&quot; style=&quot;border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 4px; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-left-width: 4px; border-right-color: rgb(238, 238, 238); border-right-style: solid; border-right-width: 4px; border-top-color: rgb(238, 238, 238); border-top-style: solid; border-top-width: 4px;&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
6. The Log.txt file will contain the passwords and look like this:&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKAFFpyQjcok0fxFRuizqlK9e3RrkJFraUTOQmbaNgo8-O7gwwORd8mLzTdyB1XW6zxmvIEnb-oGtCHtiwkYMz-ehA9_uxc-1PJWP23tLnCmBRWiNPJ2pSiN3FlaZP76C72wBx-MLUHbKz/s1600/2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKAFFpyQjcok0fxFRuizqlK9e3RrkJFraUTOQmbaNgo8-O7gwwORd8mLzTdyB1XW6zxmvIEnb-oGtCHtiwkYMz-ehA9_uxc-1PJWP23tLnCmBRWiNPJ2pSiN3FlaZP76C72wBx-MLUHbKz/s1600/2.png&quot; style=&quot;border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 4px; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-left-width: 4px; border-right-color: rgb(238, 238, 238); border-right-style: solid; border-right-width: 4px; border-top-color: rgb(238, 238, 238); border-top-style: solid; border-top-width: 4px;&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
Thats all Now you have hacked the password of victim. I hope you all have Liked It.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 22px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000; font-family: Arial, Helvetica, sans-serif; line-height: 22px;&quot;&gt;&lt;b&gt;NOTE: This is for Educational Purpose Only. Isoftdl is not responsible for any damage done by You.&lt;/b&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/5315899718340249134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/how-to-hack-gmail-account-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/5315899718340249134'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/5315899718340249134'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/how-to-hack-gmail-account-password.html' title='How to Hack Gmail Account Password ?'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSC9M-yeYnxZDySgvJQKCchTMUiAlNQz9OQe8bGtSSlxCbyFee9dNaeGtItFselLCdLrmcqtgUjnoj1NtBG3Ahn6vBwu45ujHJwZCYb-YzNIf0GWzRkbNPMODqU4ROcS8e_pC9PifTWltX/s72-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-7147178148421503426</id><published>2011-07-22T08:00:00.000+08:00</published><updated>2011-07-22T08:00:02.210+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cracking Tools"/><title type='text'>Account Cracking Tools</title><content type='html'>&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: PkTtR.png]&quot; border=&quot;0&quot; height=&quot;592&quot; src=&quot;http://i.imgur.com/PkTtR.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Cracking Tools&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: fWi4F.png]&quot; border=&quot;0&quot; height=&quot;588&quot; src=&quot;http://i.imgur.com/fWi4F.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;ProxyLeechers&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: iMeTf.png]&quot; border=&quot;0&quot; height=&quot;497&quot; src=&quot;http://i.imgur.com/iMeTf.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Proxycheckers&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: am5Hi.png]&quot; border=&quot;0&quot; height=&quot;494&quot; src=&quot;http://i.imgur.com/am5Hi.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;WordLeeching&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: zA23h.png]&quot; border=&quot;0&quot; height=&quot;504&quot; src=&quot;http://i.imgur.com/zA23h.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Combo editor&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: 7ScRb.png]&quot; border=&quot;0&quot; height=&quot;403&quot; src=&quot;http://i.imgur.com/7ScRb.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;OCX Registrator&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: qJAvl.png]&quot; border=&quot;0&quot; height=&quot;467&quot; src=&quot;http://i.imgur.com/qJAvl.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Cookies makers&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;img alt=&quot;[Image: 32ECB.png]&quot; border=&quot;0&quot; height=&quot;395&quot; src=&quot;http://i.imgur.com/32ECB.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Eset Virus scan&lt;/span&gt;&lt;div&gt;&lt;div class=&quot;spoiler_header&quot;&gt;&lt;img alt=&quot;[Image: ZhEXK.png]&quot; border=&quot;0&quot; height=&quot;446&quot; src=&quot;http://i.imgur.com/ZhEXK.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;color: #351c75;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;http://adf.ly/21RIP&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;DOWNLOAD&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/7147178148421503426/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/account-cracking-tools.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7147178148421503426'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7147178148421503426'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/account-cracking-tools.html' title='Account Cracking Tools'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-6204217440838656101</id><published>2011-07-21T18:00:00.000+08:00</published><updated>2011-07-21T18:00:08.025+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats(Remote Administrative Tools)"/><title type='text'>DarkComet - RAT v3.0.1 -TUTORIAL</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOQ_ae0iTAuZdc-iT1nx-E21o2EM6PC-uB8NiVtsIEFF6wZ-VyYu1imfMRV-3_TNbHxgNOUXTHGDE0fNkpS5ULuXs0BvQkxKx_w3S8Cs1uvpAXJ48NKY9oRgff3songFJH_L1203ZeMR38/s1600/logo.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;96&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOQ_ae0iTAuZdc-iT1nx-E21o2EM6PC-uB8NiVtsIEFF6wZ-VyYu1imfMRV-3_TNbHxgNOUXTHGDE0fNkpS5ULuXs0BvQkxKx_w3S8Cs1uvpAXJ48NKY9oRgff3songFJH_L1203ZeMR38/s400/logo.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;1)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;Create a account at&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;a href=&quot;http://www.no-ip.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;No-IP&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;2)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;Login and do this:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: se47497o.jpg]&quot; border=&quot;0&quot; height=&quot;500&quot; src=&quot;http://s13.directupload.net/images/110128/se47497o.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;3)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_header&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: ev5z9cez.jpg]&quot; border=&quot;0&quot; height=&quot;500&quot; src=&quot;http://s3.directupload.net/images/110128/ev5z9cez.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;a href=&quot;http://whatismyipaddress.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;If you dont know how to get your IP, click here.&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;4)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;Download&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;a href=&quot;http://www.darkcomet-rat.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;DarkComet&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: white; line-height: 25px;&quot;&gt;5)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_header&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: 36ef6x3p.jpg]&quot; border=&quot;0&quot; height=&quot;512&quot; src=&quot;http://s13.directupload.net/images/110128/36ef6x3p.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;6)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;Press &quot;Edit Server&quot; &amp;amp; &quot;Server Module&quot; and then just do everything I do.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: zu4z3ov7.jpg]&quot; border=&quot;0&quot; height=&quot;512&quot; src=&quot;http://s3.directupload.net/images/110128/zu4z3ov7.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;7)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_header&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: yujjn7cq.jpg]&quot; border=&quot;0&quot; height=&quot;512&quot; src=&quot;http://s3.directupload.net/images/110128/yujjn7cq.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;8)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_header&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: 65cdqbtb.jpg]&quot; border=&quot;0&quot; height=&quot;512&quot; src=&quot;http://s13.directupload.net/images/110128/65cdqbtb.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;9)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: if6uflqj.jpg]&quot; border=&quot;0&quot; height=&quot;512&quot; src=&quot;http://s7.directupload.net/images/110128/if6uflqj.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;10)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt; &lt;div class=&quot;spoiler_header&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: tqokag8r.jpg]&quot; border=&quot;0&quot; height=&quot;512&quot; src=&quot;http://s7.directupload.net/images/110128/tqokag8r.jpg&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;Press  +Listen and add the port you want to listen to, it must be the same  port you have added on picture 8, if you dont know how to port forward,  just use the search button up there ;)&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 25px;&quot;&gt;Now  you can start to spread your server, if you are not sure how to do it  correct or you just want to know the best way, use the search button.&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/6204217440838656101/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/darkcomet-rat-v301-tutorial.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6204217440838656101'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6204217440838656101'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/darkcomet-rat-v301-tutorial.html' title='DarkComet - RAT v3.0.1 -TUTORIAL'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOQ_ae0iTAuZdc-iT1nx-E21o2EM6PC-uB8NiVtsIEFF6wZ-VyYu1imfMRV-3_TNbHxgNOUXTHGDE0fNkpS5ULuXs0BvQkxKx_w3S8Cs1uvpAXJ48NKY9oRgff3songFJH_L1203ZeMR38/s72-c/logo.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-117543255701868902</id><published>2011-07-21T13:39:00.002+08:00</published><updated>2011-07-21T13:39:00.212+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Mobius Forensic Toolkit v0.5.8</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGMgDvok9aYmy3J0pzb6z8ntSWsPD-03JzQKj9SadLjw-8Ew_Uic9OfcbQN2OmINaLBSqa0Hf19REA_avu552Io_mX_6mzYalQsHSnTG18P-FmRZvIB8PHB9dmLPnWEs2kXCbAi7Uht9q/s1600/ebc0638512eaa682a30e0c4d6db2f96a_medium.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGMgDvok9aYmy3J0pzb6z8ntSWsPD-03JzQKj9SadLjw-8Ew_Uic9OfcbQN2OmINaLBSqa0Hf19REA_avu552Io_mX_6mzYalQsHSnTG18P-FmRZvIB8PHB9dmLPnWEs2kXCbAi7Uht9q/s320/ebc0638512eaa682a30e0c4d6db2f96a_medium.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;Mobius  Forensic Toolkit is a forensic framework written in Python/GTK that  manages cases and case items, providing an abstract interface for  developing extensions. Cases and item categories are defined using XML  files for easy integration with other tool.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: grey; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #8e7cc3; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;Changelag&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font-style: inherit; font-weight: 600; line-height: 1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/h3&gt;&lt;ul style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-origin: initial; background-position: 0% 7px; list-style-image: none; list-style-type: none; padding-bottom: 5px; padding-left: 15px; padding-right: 0px; padding-top: 5px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The Hive (registry viewer) features three new reports:email accounts, TCP/IP interfaces, and computer descriptions.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-origin: initial; background-position: 0% 7px; list-style-image: none; list-style-type: none; padding-bottom: 5px; padding-left: 15px; padding-right: 0px; padding-top: 5px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;All  registry reports can be exported as CSV and the user password report  can be exported in a format suitable for John the Ripper as well.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-origin: initial; background-position: 0% 7px; list-style-image: none; list-style-type: none; padding-bottom: 5px; padding-left: 15px; padding-right: 0px; padding-top: 5px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Minor improvements were made&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Installation&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;As root, type:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: monospace;&quot;&gt;python setup.py install&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: monospace;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Usage&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Run&amp;nbsp;&lt;i style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;mobius_bin.py&lt;/i&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;a href=&quot;http://freshmeat.net/projects/mobiusft&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/117543255701868902/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/mobius-forensic-toolkit-v058.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/117543255701868902'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/117543255701868902'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/mobius-forensic-toolkit-v058.html' title='Mobius Forensic Toolkit v0.5.8'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmGMgDvok9aYmy3J0pzb6z8ntSWsPD-03JzQKj9SadLjw-8Ew_Uic9OfcbQN2OmINaLBSqa0Hf19REA_avu552Io_mX_6mzYalQsHSnTG18P-FmRZvIB8PHB9dmLPnWEs2kXCbAi7Uht9q/s72-c/ebc0638512eaa682a30e0c4d6db2f96a_medium.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-6752136075634353402</id><published>2011-07-21T09:00:00.000+08:00</published><updated>2011-07-21T09:00:00.964+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats(Remote Administration Tools)"/><title type='text'>Cerberus 1.03.4 Beta Tutorial</title><content type='html'>&lt;div style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; text-align: center;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: cerberusw.png]&quot; border=&quot;0&quot; src=&quot;http://img36.imageshack.us/img36/9809/cerberusw.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
1)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Download&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;a href=&quot;http://www.mediafire.com/?mtmzut0lygj&quot;&gt;Cerberus&amp;nbsp;1.03.4 Beta&lt;/a&gt;.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Also,  for those who aren&#39;t aware of this, if you right-click on a slave&#39;s  thumbnail in the online server list and click &#39;Capture Desktop&#39;, you can  click in that screen and register mouse clicks on their computer. I&#39;m  ashamed to admit this, but I only just realized that. :O&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;2)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Browse to the&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;folder, and run&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;.exe as shown.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image1a.png]&quot; border=&quot;0&quot; height=&quot;347&quot; src=&quot;http://img46.imageshack.us/img46/4541/image1a.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;3)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;The  client window will be displayed. This is the main window which would be  displaying a list of connections and their info, had you actually any  victims online. Of course at the moment, it is empty. But when you do  have victims, you would right-click on their name/icon to bring up a  pop-up menu which would provide you with the option to do all sorts of  fun stuff.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image2rl.png]&quot; border=&quot;0&quot; height=&quot;297&quot; src=&quot;http://img269.imageshack.us/img269/9383/image2rl.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;4)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click  on the Options button at the lower left corner of the window. This  brings up Program Options. You can choose to leave the password as it  is, or make a new one.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image3wa.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img39.imageshack.us/img39/5295/image3wa.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;You  have the option to enter 3 ports to listen to. If you don&#39;t know how to  port forward ports, go search for a tutorial on port forwarding. Once  you have your desired ports properly forwarded, enter them (a maximum of  3) into these fields. As you can see, I left the first field default  (5150) and then set the second to my preferred port (8245). No, this  number doesn&#39;t have a whole lot of meaning. Just make sure it is  forwarded. Now click Save, and click on Options again. If you just  advance to the next radio button, your changes might not be saved.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;5)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;In the username box, enter the email address you used to sign up at&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;a href=&quot;http://www.no-ip.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.no-ip.com&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;.  If you don&#39;t have an IP registered there, go search for a tutorial on  making a no-ip address then come back here once you have your account.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;In the password box, enter the password you used at&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;a href=&quot;http://www.no-ip.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.no-ip.com&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image4gw.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img36.imageshack.us/img36/7151/image4gw.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click Update, Save, then Exit.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;6)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click the New button at the lower left, near the Options button.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;This is where you start the creation of your server that you want your victims to click on.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click the Basic Options button.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: mainu.png]&quot; border=&quot;0&quot; height=&quot;290&quot; src=&quot;http://img709.imageshack.us/img709/8162/mainu.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Where I have entered kaidz account.no-ip.biz, you would replace with your own no-ip address that you registered that&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;a href=&quot;http://www.no-ip.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.no-ip.com&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click  the + button to add it to the Address Book. This is the address your  server will try to connect to (destination: YOU). The password must be  the same used in Step (E). Connection port must be a properly forwarded  port, and one of the possible 3 ports that your&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;client will be listening to.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;7)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click the Server Installation radio button.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Set your options as I have. They don&#39;t need to be exact, except for the fact that Install Server must be checked.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;The  directory installation isn&#39;t very important, nor are the exact names  you choose, but I would suggest you choose any directory besides  Temporary Directory.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image6d.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img709.imageshack.us/img709/7453/image6d.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;8)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Select  the Boot Methods radio button. This is where you will configure how  your server is started whenever their PC is restarted.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Set  your options as mine (you can change &#39;WindowsUpdate&#39; to what ever you  want) and click the + button after Active Setup a few times.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image7o.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img41.imageshack.us/img41/9335/image7o.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;9)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;This  is where you bind a file of your choice to be run whenever your server  is clicked on. If you aren&#39;t interested in binding a file to your  server, skip this step.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image8r.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img709.imageshack.us/img709/9724/image8r.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Click the...button after file to select a file to be bound inside your server.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;In  most circumstances, if the file is something the user actually wants,  you would set Execution to Shell Execute (Normal). However, if you don&#39;t  want any signs of this second added file being visible to the slave,  set it to Shell Execute (Hidden). Setting the Destination to anything  other than Temporary Directory is preferable. Make sure that a check-box  is checked besides each file you want included in the server.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;10)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Here are some miscellaneous options. I would recommend checking &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;Keylogger&lt;/a&gt; Active, so it is easier for you to steal passwords as your slave logs-in to websites.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image9p.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img36.imageshack.us/img36/9176/image9p.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Check  Inject into Default Browser or select Process if you want your server  to attempt to hide itself inside a running instance of the user-defined  process ( I typed explorer, but if I wanted to inject into the Windows  Explorer process I&#39;m pretty sure that I should have typed Explorer.exe  instead), and if it fails, it then injects itself into the slave&#39;s  default browser. Among other things, this aids in preventing your server  from being removed by an Anti-Virus program. Nothing is certain though,  of course.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;The  Mutex is any value which uniquely identifies this certain build of your  server. If another server with the same Mutex attempts to start, it  will cancel because the same server will already be running. You can set  the Mutex to whatever you like, or leave it alone.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;11)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Under  the Create Server page ( you can ignore Display Message, Blacklist, and  Overview as they aren&#39;t really relevant to this tutorial ), pick a name  for your server (which of course you can rename whenever), and select  its icon. If the icon you want isn&#39;t in the&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;\Icons  directory, then it won&#39;t be available for selection from the Icons  List. To select a different icon, click on the icon image itself to load  another. Of course, Use icon must be checked.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image10v.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img96.imageshack.us/img96/1594/image10v.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Compact  Server with UPX indicates that you want your server to be compressed  (in other words, reduced in file size) by the UPX freeware executable  compressor. Optional.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Under  the File Extension drop down menu, you must select either Application  (*.exe) or Screen Saver (*.scr) if you want your selected icon to be  displayed.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;When you are done, click Create Server.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;The following window will pop-up:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image11pu.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img39.imageshack.us/img39/1373/image11pu.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;A  description of what this means is beyond the scope of this tutorial  (actually, I&#39;m just too lazy to explain it) so you can go ahead and  click No.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Another dialog will inform you that your server was created, and where it is located (usually in the&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;folder). You now have your server!&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image13.png]&quot; border=&quot;0&quot; height=&quot;295&quot; src=&quot;http://img96.imageshack.us/img96/3533/image13.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Now,  it is time to test it. One way of doing this is to run it on a spare  computer that has access to the internet; in my case, I was was away  from home so I didn&#39;t have this luxury. I just run the server myself,  and if all goes as expected, my&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;will  play this beast growling sound, and show a little balloon over it&#39;s  taskbar icon, indicating that you have obtained a connection to a new  slave!&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;12)&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;You  are done. Well, not quite. You need to spread your server in a way that  will get potential victims into running it, but that is an entire class  of its own in art of computer hacking. There are whole tutorials on  that subject.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;Once you are done making your server, make sure that you minimize the main&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&amp;nbsp;Cerberus&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;window  so that it is reduced to an icon on the taskbar. This way you can  always be listening for connections when a slave runs your server, and  you will be notified every so often of the number of currently connected  servers in the following manner:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;img alt=&quot;[Image: image14q.png]&quot; border=&quot;0&quot; src=&quot;http://img96.imageshack.us/img96/931/image14q.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt;That is it ! Hope you enjoyed and understood tutorial.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px;&quot;&gt; &lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/6752136075634353402/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/cerberus-1034-beta-tutorial.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6752136075634353402'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6752136075634353402'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/cerberus-1034-beta-tutorial.html' title='Cerberus 1.03.4 Beta Tutorial'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-1022483782537905609</id><published>2011-07-20T21:34:00.001+08:00</published><updated>2011-07-20T21:34:00.598+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats(Remote Administrative Tools)"/><title type='text'>Blackshades NET -Complete Tutorial [Port Forward-&gt;Setup-&gt;Connect]</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWkkk7lnFuU5PxBuHM05bonUTMA5rE0qpS1O2c0ZWaUBJVSjj9bqglMzDKuj8Medl4ryd5LSxwD0Jy_fS27NajvzVbDYBQ6zvSetHX7SK7z__an_VqtI9zQ8hXje0JcwwpBwQrSPTmZumP/s1600/Blackshades.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;107&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWkkk7lnFuU5PxBuHM05bonUTMA5rE0qpS1O2c0ZWaUBJVSjj9bqglMzDKuj8Medl4ryd5LSxwD0Jy_fS27NajvzVbDYBQ6zvSetHX7SK7z__an_VqtI9zQ8hXje0JcwwpBwQrSPTmZumP/s320/Blackshades.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Blackshades&amp;nbsp;is  the best RAT available in the Internet till now and it seems to be like  many have problems using it,so here&amp;nbsp;is a walk through:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;a href=&quot;http://adf.ly/1eGcG&quot;&gt;DOWNLOAD Blackshades NET&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: limegreen;&quot;&gt;Unit 1: Port Forwarding&lt;br /&gt;
Unit 2: Setting up&amp;nbsp;Blackshades&amp;nbsp;NET&lt;br /&gt;
Unit 3: Connecting to your slave&lt;br /&gt;
Unit 4: Special Features&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: tomato;&quot;&gt;&lt;b&gt;Unit 1: Port Forwarding&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;First  we need to port forward to send and recieve connections  through&amp;nbsp;Blackshades&amp;nbsp;NET so follow these steps to forward your&amp;nbsp;ports&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Go to your router&#39;s settings page,Its usually 10.0.0.1 or 192.168.1.1 after trying this into&lt;br /&gt;
your  address bar of your web browser you will be asked for login  settings,login to your router by typing the username and&amp;nbsp;password.After  loging in you will see this page&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt; &lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: pf1.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img253.imageshack.us/img253/3461/pf1.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Note:&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;These might not be applicable to all routers.If you find any difficulties please visit&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://www.portforward.com/&quot; style=&quot;text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://www.portforward.com&lt;/a&gt;&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Setp 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Now go to Port Forward settings(usually under Advanced settings) and then&lt;br /&gt;
click  &quot;Add Custom Service&quot; and then type any name for it and then select  service type as Both or TCP/UDP and starting port&amp;nbsp;as &quot;port number  number&quot;,ending port as &quot;port number&quot;.And the server ip address as your  LAN IP(You can find by typing&amp;nbsp;ip config in CMD.Its the ipv4 you need to  type). For&amp;nbsp;Blackshades&amp;nbsp;we use 2 ports so forward 2 ports.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt; &lt;div class=&quot;spoiler_header&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: pf2.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img521.imageshack.us/img521/3439/pf2.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Thats it,you are done with Port Forwarding :)&lt;/span&gt;&lt;b&gt;&lt;br /&gt;
&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: tomato;&quot;&gt;Unit 2: Setting up&amp;nbsp;Blackshades&amp;nbsp;NET&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: tomato;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Open client.exe to launch&amp;nbsp;Blackshades&amp;nbsp;NET and then you are automatically logged in to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Blackshades&amp;nbsp;Client&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Setp 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  Now click &quot;Create Server&quot; tab and right click in &quot;profiles pane&quot; and  select &quot;Create new&quot; and&amp;nbsp;enter a profile name for it and click ok.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 3&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Type your No-IP or DynDNS address into the &quot;IP/DNS&quot; area&lt;br /&gt;
Note:To create a No-IP address goto No-IP.com and register an account there and select &quot;Add Host&quot; and create one.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt; &lt;div class=&quot;spoiler_body&quot; style=&quot;display: block;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: noipe.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img36.imageshack.us/img36/3426/noipe.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 4&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Type the Ports that you forwarded.First port as &quot;Port&quot;,second port as &quot;Transfer Port&quot;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 5&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Name anything as your &quot;Server ID&quot;,its just to identify the slave.You dont want to disturb&lt;br /&gt;
the &quot;Encryption Key&quot;!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 6&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  Enter the &quot;File name&quot; for the server that would be created.You can use  &quot;Hide File&quot; feature if&amp;nbsp;you want a silent execution of the server file.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 7&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Select the &quot;Install path&quot; for the server to get installed,either &quot;Application data&quot; or &quot;Temp&lt;br /&gt;
directory&quot;&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 8&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Select the &quot;Install mode&quot; for the server whether to Install,Melt,Protect Process.Note:&lt;br /&gt;
(Optional step)&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 9&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: You can set the &quot;Delay&quot; time for the connection between your client and the server here.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 10&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Enter &quot;HKCU&quot; as something which appears like a system name,eg:WinNT and Use &quot;Startup&quot;&lt;br /&gt;
feature if you want to server to run each time the computer is restarted.Note:(Optional step)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 11&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:Generate &quot;ActiveX&quot; if you had selected &quot;Startup&quot; feature.Note: (Optional Step)&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 12&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:Generate &quot;Mutex&quot; for the server by clicking &quot;Generate&quot;&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 13&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  Click &quot;Infect USB&quot; if you want to infect the slave&#39;s USB with your  virus,select &quot;Compress with UPX&quot; if you&amp;nbsp;want to compress your server  size.Select &quot;Change Icon&quot; if you want to change the icon.Select &quot;Clone  File Information&quot; if&amp;nbsp;you want to clone some file&#39;s  information.Note:(Optional step)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 14&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Click &quot;Save&quot; to save your profile information.Note:(Optional step)&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 15&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Click &quot;Build&quot; to create your server&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cccccc;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-width: initial;&quot;&gt;&lt;img alt=&quot;[Image: builddy.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img143.imageshack.us/img143/9672/builddy.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Thats it the server is now built...&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: tomato;&quot;&gt;Unit 3: Connecting to your slave&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  The server file that has been generated should be ran on the slave&#39;s  PC.You need to send the&amp;nbsp;file to the slave with the server being crypted  and binded or else the slave will find out that its a Virus.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Note:&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Crypting&amp;nbsp;and Binding is an Optional step.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Go to &quot;Settings&quot; tab and enter the two forwarded ports.First Port as &quot;Connection Port&quot; and&amp;nbsp;Second Port as &quot;Transfer Port&quot;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 3&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Click &quot;Activate&quot; buttons for both &quot;Connection Port&quot; and &quot;Transfer Port&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 4&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: After activating the 2 ports you can test them by clicking on &quot;Test Port&quot; adjacent to the&lt;br /&gt;
&quot;Activate&quot; buttons if the ports are forwarded correctly.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cccccc; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: connectiond.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img716.imageshack.us/img716/5745/connectiond.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 5&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: After doing all,goto &quot;Connections&quot; tab to view and control all your slave computers.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cccccc;&quot;&gt;&lt;img alt=&quot;[Image: connected.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img263.imageshack.us/img263/6766/connected.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Thats all ! You are now connected with your slave PCs...&lt;/span&gt;&lt;b&gt;&lt;br /&gt;
&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: tomato;&quot;&gt;Unit 4: Special Features&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This is a small guide explaining the Special and unique Features of&amp;nbsp;Blackshades&amp;nbsp;NET.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: tomato;&quot;&gt;1)Asynchronus Mode:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Asynchronus mode is used for very holding large number of bots.&lt;br /&gt;
This  mode does not connect all the bots to your computer at the same time  which might cause instability but keeps the bots&amp;nbsp;at stake.That is you  wont be connected to all the bots at the same time but you can connect  to specific bots whenever you&amp;nbsp;want to and at the other time you keep  them at stake.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Goto &quot;Settings&quot; tab and select &quot;Asynchronous Mode&quot; and then the bots will connect in&amp;nbsp;Asynchronous mode.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: To control a specific slave just select any function that you want to perform just as you do&lt;br /&gt;
normally and then&amp;nbsp;Blackshades&amp;nbsp;will ask you if you want to establish connection between the slave and your PC,select Ok.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cccccc; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: asyncmode.png]&quot; border=&quot;0&quot; height=&quot;480&quot; src=&quot;http://img28.imageshack.us/img28/570/asyncmode.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Note:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;The connection time may take a while when doing this.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: tomato;&quot;&gt;2)Station:&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The  station feature in&amp;nbsp;Blackshades&amp;nbsp;is similar to the normal Server but it  reduces the quality of the server.The usage of&amp;nbsp;the Station is only when  if you want to connect to someone&#39;s PC securely.That is,the slave cannot  traceback that it is you&amp;nbsp;who has RATted the slave.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Create a Station just like you did when creating a server but just use different No-IP or&lt;br /&gt;
DynDns address as your &quot;Master IP/DNS&quot;.Its better to use different &quot;Mutex&quot;,&quot;HKLM&quot; if you use both &quot;Sever&quot; and &quot;Station&quot;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  Set &quot;Master port&quot; as 80 and &quot;Master Transfer Port as &quot;3389&quot; and &quot;Bot  Port&quot; as the Fist Port&amp;nbsp;that you forwarded and &quot;Bot Transfer Port&quot; as the  Second Port that you forwarded.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 3&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Click &quot;Build&quot; to create the Station&lt;/span&gt;&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: tomato;&quot;&gt;3)On-Join Feature:&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The  On-Join Feature will basically execute the command that you have set  whenever a specific bot or all bots connect to&amp;nbsp;your Client.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;The tasks that could be performed are:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;i)Dload.Exec - Download and Execute -This will download and execute a file on the slave PC&lt;br /&gt;
ii)Update - This will update the server/station on the slave PC by replacing your previous file.&lt;br /&gt;
iii)Keylog - This will start Keylogging the slave&#39;s PC&lt;br /&gt;
iv)Password - This will steal all the passwords from the slave&#39;s PC&lt;br /&gt;
v)Visit site - This will make the slave PC to visit a site.&lt;br /&gt;
vi)Spread - This will start spreading your virus to the slave&#39;s USB,IM,WinRAR,etc&lt;br /&gt;
vii)Notify - Sound - This will alert you with a sound when connected to the slave&#39;s PC&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Go to &quot;On-join&quot; tab and sort out for which bots you want to use the On-Join feature by&lt;br /&gt;
specifying the &quot;ID&quot;,&quot;WAN&quot;,&quot;Country&quot;,&quot;Version&quot;.Or use * to execute the task in all bots&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Select the prefered task from the &quot;Task&quot; drop down list.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 3&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:Click Add to add the fuction.You can add many functions.&lt;/span&gt;&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: tomato;&quot;&gt;4)Web Interface:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;The  web interface is used if you want to control your victims using a  phone,OS including and other than Windows whic are&amp;nbsp;connected by LAN in a  web interface.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  Goto the folder where you have installed&amp;nbsp;Blackshades&amp;nbsp;NET and then  /data/web and there open&amp;nbsp;users.txt and there you can add/remove with  admin and guest privileges.eg:admin:bsnet:password.Save the document&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Goto &quot;Settings&quot; tab and under &quot;Web Interface&quot; Pane type a port and click &quot;Activate&quot; to start&amp;nbsp;using the Web Interface&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 3&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: By clicking Permissions you can adjust the guest permissions on controlling the bot.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 4&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: So now its activated,now you just need any device which needs to be connected with your computer in a LAN network&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 5&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  Once your device is connected through LAN,goto web browser and type the  LAN IP address of your PC suffixed with a colon then your port number  for this.Example: 10.0.0.1:80&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 6&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Once you do that you get a login screen where you can login with your details and control your bots.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: tomato;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: tomato;&quot;&gt;5)Market:&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The&amp;nbsp;Blackshades&amp;nbsp;Market  is a inbuilt market to buy and sell installs/victims/bots safely  without the fear of being bot killed&amp;nbsp;or scammed.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 1&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Go to &quot;Market&quot; tab and if you want to buy bots click &quot;Continue&quot; in &quot;Buyers&quot; panel and then&lt;br /&gt;
click proceed.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 2&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Enter the direct link to your virus in &quot;URL/Link to your bot&quot;&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 3&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Select the seller from whom you want to buy and click &quot;Next&quot; and proceed after reading the&lt;br /&gt;
terms and conditions.&lt;/span&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 4&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;:  If you want to become a seller click &quot;Continue&quot; in &quot;Sellers&quot; panel and  set your price per 100&amp;nbsp;bots and give your contact email id and choose  your minimum payout.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: dodgerblue;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;post_body&quot; id=&quot;pid_7276358&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: dodgerblue;&quot;&gt;Step 5&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;: Click Enroll to become a seller.&lt;br /&gt;
&lt;br /&gt;
Ok so after reading this tutorial you should be able to use&amp;nbsp;Blackshades&amp;nbsp;effectively.&lt;br /&gt;
Thnx for reading the Tutorial.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/1022483782537905609/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/blackshades-net-complete-tutorial-port.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1022483782537905609'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1022483782537905609'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/blackshades-net-complete-tutorial-port.html' title='Blackshades NET -Complete Tutorial [Port Forward-&gt;Setup-&gt;Connect]'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWkkk7lnFuU5PxBuHM05bonUTMA5rE0qpS1O2c0ZWaUBJVSjj9bqglMzDKuj8Medl4ryd5LSxwD0Jy_fS27NajvzVbDYBQ6zvSetHX7SK7z__an_VqtI9zQ8hXje0JcwwpBwQrSPTmZumP/s72-c/Blackshades.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-298481828350745516</id><published>2011-07-20T13:31:00.002+08:00</published><updated>2011-07-20T13:31:02.349+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="TUTORIAL"/><title type='text'>DIFFERENT TYPE OF SERVERS</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKuTLTouObJkA5A6ir3jgYgjQzF_mv_YqsvIaIsc421JykoMh8ekwiJaAES2n_5hjmB6mXB0fD_-5FQ4ECfpu1Be77pg5Vykldbqsn-VLbHGBjdIUf16jRrbfo2kGs0dWa74Faefnw9Oqy/s1600/server-based-network.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKuTLTouObJkA5A6ir3jgYgjQzF_mv_YqsvIaIsc421JykoMh8ekwiJaAES2n_5hjmB6mXB0fD_-5FQ4ECfpu1Be77pg5Vykldbqsn-VLbHGBjdIUf16jRrbfo2kGs0dWa74Faefnw9Oqy/s1600/server-based-network.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif; line-height: 18px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;What is a Server?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;A  server is a device with a particular set of programs or protocols that  provide various services, which other machines or clients request, to  perform certain tasks. Together, a server and its clients form a  client/server network which provides routing systems and centralized  access to information, resources, stored data, etc. At the most ground  level, one can consider it as a technology solution that serves files,  data, print, fax resources and multiple computers. The advanced server  versions, like Windows Small Business Server 2003 R2 enable the user to  handle the accounts and passwords, allow or limit the access to shared  resources, automatically support the data and access the business  information remotely. For example, a file server is a machine that  maintains files and allows clients or users to upload and download files  from it. Similarly, a&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;web server&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;hosts  websites and allows users to access these websites. Clients mainly  include computers, printers, faxes or other devices that can be  connected to the server. By using a server, one can securely share files  and resources like fax machines and printers. Hence, with a server  network, employees can access the&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;Internet&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;or company e-mail simultaneously.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;Servers  also offer remote-management tools&amp;nbsp;— which means an IT person can check  usage and diagnose problems from another location. This also means you  can perform routine maintenance such as adding new users or changing  passwords&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2nU1hGfcQJo8n2fZjAqjJt915lMEkzmL-9YJKVKQivoHC7tUMGWHZSB9VAo8J2BxAw0s1FUDRwoaxZiOwFf7iHvs_el1wpela6YFk555yCcMJVf0YQsLX51lsrMDPxSJ-b4ybwyRf767E/s1600/287475-41618-43.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2nU1hGfcQJo8n2fZjAqjJt915lMEkzmL-9YJKVKQivoHC7tUMGWHZSB9VAo8J2BxAw0s1FUDRwoaxZiOwFf7iHvs_el1wpela6YFk555yCcMJVf0YQsLX51lsrMDPxSJ-b4ybwyRf767E/s320/287475-41618-43.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Different Types of Servers&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The multiple types of servers or types of network servers are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;Server Platform:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Server  platform is the fundamental hardware or software for a system which  acts as an engine that drives the server. It is often used synonymously  with an operating system.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Application Server:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;Also  known as a type of middleware, it occupies a substantial amount of  computing region between&amp;nbsp;database&amp;nbsp;servers and the end user, and is  commonly used to connect the two.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;Audio/Video Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It provides multimedia capabilities to websites by helping the user to broadcast streaming multimedia content.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;Chat Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It  serves the users to exchange data in an environment similar to Internet  newsgroup which provides real time discussion capabilities.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;Fax Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It  is one of the best option for organizations seeking for minimum  incoming and outgoing telephone resources, but require to fax actual  documents.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;FTP Server:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;It  works on one of the oldest of the Internet services, the&amp;nbsp;file transfer  protocol. It provides a secure file transfer between computers while  ensuring file security and transfer control.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;Groupware Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It  is a software designed that enables the users to work together,  irrespective of the location, through the Internet or a corporate  intranet and to function together in a virtual atmosphere.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;IRC Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It  is an ideal option for those looking for real-time discussion  capabilities. Internet Relay Chat comprises different network servers  that enable the users to connect to each other through an IRC network.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;List Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It  provides a better way of managing mailing lists. The server can be  either open interactive discussion for the people or a one-way list that  provide announcements, newsletters or advertising.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Mail Server:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It transfers and stores mails over corporate networks through&amp;nbsp;LANs,&amp;nbsp;WANs&amp;nbsp;and across the Internet.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;News Server:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;It serves as a distribution and delivery source for many public news groups, approachable over the USENET news network.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Proxy Server:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;It  acts as a mediator between a client program and an external server to  filter requests, improve performance and share connections.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Telnet Server:&lt;/span&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;It enables the users to log on to a host computer and execute tasks as if they are working on a remote computer.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;Web Server:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;It  provides static content to a web browser by loading a file from a disk  and transferring it across the network to the user&#39;s web browser. This  exchange is intermediated by the browser and the server, communicating  using&amp;nbsp;HTTP.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;These  were the different types of servers which can be categorized according  to their applications. Servers along with managing network resources are  also dedicated, i.e. they perform no other task other than their server  tasks.&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/298481828350745516/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/different-type-of-servers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/298481828350745516'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/298481828350745516'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/different-type-of-servers.html' title='DIFFERENT TYPE OF SERVERS'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKuTLTouObJkA5A6ir3jgYgjQzF_mv_YqsvIaIsc421JykoMh8ekwiJaAES2n_5hjmB6mXB0fD_-5FQ4ECfpu1Be77pg5Vykldbqsn-VLbHGBjdIUf16jRrbfo2kGs0dWa74Faefnw9Oqy/s72-c/server-based-network.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-8829744801662221496</id><published>2011-07-20T09:00:00.000+08:00</published><updated>2011-07-20T09:00:05.204+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>OWASP MANTRA SECURITY TOOLKIT - GANDIVA BETA 0.61</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-TQORvx2dr8ddctL_iI_xJdBGGTJmTTsV434S29w3CNXiL4j1Ki1JsspnIy4UDxMtD1A740D6BBVOSvob9HMfBpyZLj56oO64ZdlLkBBMwkgNt6kvSw1bkrWkR_e0KgYCMI7FDiOOkzvS/s1600/Gandiva_1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-TQORvx2dr8ddctL_iI_xJdBGGTJmTTsV434S29w3CNXiL4j1Ki1JsspnIy4UDxMtD1A740D6BBVOSvob9HMfBpyZLj56oO64ZdlLkBBMwkgNt6kvSw1bkrWkR_e0KgYCMI7FDiOOkzvS/s400/Gandiva_1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&lt;strong&gt;Mantra&lt;/strong&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;is  a dream that came true. It is a collection of free and open source  tools integrated into a web browser, which can become handy for  students, penetration testers, web application developers, security  professionals etc. It is portable, ready-to-run, compact and follows the  true spirit of free and open source software.&amp;nbsp;&lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Mantra&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;is  a security framework which can be very helpful in performing all the  five phases of attacks including reconnaissance, scanning and  enumeration, gaining access, escalation of privileges, maintaining  access, and covering tracks. Apart from that it also contains a set of  tools targeted for web developers and code debuggers which makes it  handy for both offensive security and defensive security related tasks.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Mantra&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;is  lite, flexible, portable and user friendly with a nice graphical user  interface. You can carry it in memory cards, flash drives, CD/DVDs, etc.  It can be run natively on Linux, Windows and Mac platforms. It can also  be installed on to your system within minutes.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;strong&gt;Mantra&lt;/strong&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;is absolutely free of cost and takes no time for you to set up.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The beta version of&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;strong&gt;Mantra&lt;/strong&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;Security Toolkit contains following tools built onto it. Moreover&amp;nbsp;&lt;/span&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Mantra&lt;/span&gt;&lt;/strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;follows the guidelines and structure of&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.firecat.fr/&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;FireCAT&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;which makes it even more acessible. You can also always suggest any tools/ scripts that you would like see in the next release.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: inherit; font-weight: inherit; line-height: 19px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt; &lt;a href=&quot;http://draft.blogger.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial, Helvetica, sans-serif;&quot;&gt;DOWNLOAD&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/8829744801662221496/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/owasp-mantra-security-toolkit-gandiva.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/8829744801662221496'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/8829744801662221496'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/owasp-mantra-security-toolkit-gandiva.html' title='OWASP MANTRA SECURITY TOOLKIT - GANDIVA BETA 0.61'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-TQORvx2dr8ddctL_iI_xJdBGGTJmTTsV434S29w3CNXiL4j1Ki1JsspnIy4UDxMtD1A740D6BBVOSvob9HMfBpyZLj56oO64ZdlLkBBMwkgNt6kvSw1bkrWkR_e0KgYCMI7FDiOOkzvS/s72-c/Gandiva_1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-677788607072116370</id><published>2011-07-19T12:22:00.000+08:00</published><updated>2011-07-19T12:22:03.879+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rats(Remote Administrative Tool)"/><title type='text'>BLACKSHADES 4.2 CRACKED</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;http://img88.imageshack.us/img88/84/sanstitre5xz.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;204&quot; src=&quot;http://img88.imageshack.us/img88/84/sanstitre5xz.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;All right&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;I&#39;ve noticed ppl having trouble still with the crack.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;Since that last thread has degenerated into incoherent jibber-jabber,&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt; &lt;a href=&quot;http://img263.imageshack.us/img263/1772/blackshade.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;174&quot; src=&quot;http://img263.imageshack.us/img263/1772/blackshade.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;I am posting this here. The culmination of our (My) efforts.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;Everyone use THIS as the latest known working version of the crack.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;And  yes, just in case the 4.2 is deleted from the official site ive decided  to mirror it in here. This will contain everything needed to run. Try  not to change anything unless you know what you are doing.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;Things to remember:&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;1: Only keep the login server on if you want to generate a server. Once ur finished, feel free to turn it off.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;2:  Run the login server to be able to login. Type anything you want in  that login box. Think of it as a server with no authentication. Its like  we&#39;re ruining cloud computing here. But we should! If it were up to  cloud computing none of us would have PERSONAL computers.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;3:When  making a server, for this implementation of the crack, SAVE your  settings BEFORE you build. If you read the source code ull understand  why.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;4:  Atm you cannot inject the server into other processes. You can only  inject the server into itself. Like, say u have a crypter which uses  injection. If it injects the server into its own memory image then its  ok. If you try to inject into say svchost, it&#39;ll be blocked by DEP.  Thank god I didnt lose any bots permanently due to that.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;5:  If you are using like DarkComet and want to migrate to blackshades like  I have, and you are foolhardy enuf to have them running on the same  ports, when your DarkComet gets few or no connections, it is bcuz the  blackshades servers are effectively DoS&#39;ing your DC client. (But its  worth moving over. That filemanager is fuckin FAST! AND IT HAS  TIMESTAMPS!!! AND REVERSE RELAY! But I digress.) Keep that in mind ad  you migrate. The workaround obv uses windows firewall inbound filtering  rules. I will not explain how to do that.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;6:  Keep the msvbvm60.dll file in there, otherwise itll revert back to  being uncracked. And it may prompt you to update. In fact it will. 4.3  is released. Doesnt really have any new features that are useful, but  since this one is cracked they thought theyd release a new version more  secure just to keep their uncrackable RAT title. They can keep their  title, and we can keep their RAT ^_^. I mean hey this 4.2 is kickass  already. Who needs a steam stealer when you have keylogs eh? And this  crack obviously will NEVER prompt for update.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;It.  Will. Work. FOREVER!!! ... until windows decides to stop supporting vb6  binaries, which is prolly not happening anytime soon. ( I mean it wont  literally work yknow... forever... but.... u get the point)&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;Is  that it? I think thats pretty much it. Remember you can run the login  server source code in autoit SciTe if you dont rly trust the binary.  Hell if you find a better server generation method, like oh i dunno  maybe the right way to do it, like the official server does, feel free  to patch it into the source!!!&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Verdana, Arial, sans-serif; font-size: 13px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;a href=&quot;http://www.mediafire.com/?9hb1a9j7dstac4c#1&quot;&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/677788607072116370/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/blackshades-42-cracked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/677788607072116370'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/677788607072116370'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/blackshades-42-cracked.html' title='BLACKSHADES 4.2 CRACKED'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-997231927083884154</id><published>2011-07-19T05:24:00.000+08:00</published><updated>2011-07-19T05:24:00.240+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Keyloggers"/><title type='text'>A BEGINNERS GUIDE TO KEYLOGGING</title><content type='html'>&lt;div class=&quot;post_body&quot; id=&quot;pid_10999524&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; line-height: 18px; padding-bottom: 5px; padding-left: 5px; padding-right: 5px; padding-top: 5px;&quot;&gt; &lt;div style=&quot;color: #cccccc; font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;img alt=&quot;[Image: biginnersguide1.png]&quot; border=&quot;0&quot; src=&quot;http://img222.imageshack.us/img222/3209/biginnersguide1.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;br /&gt;
&lt;img alt=&quot;[Image: biginnersguide2.png]&quot; border=&quot;0&quot; src=&quot;http://img843.imageshack.us/img843/1757/biginnersguide2.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;Welcome to a Beginner&#39;s Guide to &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;Keyloggers&lt;/a&gt;!  In this guide I will go through all the common topics that you may need  to know. When you finish reading this topic you will know everything  you will ever need to get started &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogging&lt;/a&gt;.  I cover every topic related to keyloggers as well as cover terminology  and definitions. I&#39;ll explain how a keylogger works and how to even get  started making your own! So let&#39;s get started!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: #cccccc; font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;img alt=&quot;[Image: tableofcontents.png]&quot; border=&quot;0&quot; src=&quot;http://img821.imageshack.us/img821/6431/tableofcontents.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8; font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What is a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Learning the lingo and definitions.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Common features &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keyloggers&lt;/a&gt; have.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;How do I use a&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keylogger&lt;/a&gt;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What is a &quot;stub&quot;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What is the &quot;server&quot;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What is crypting?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What is the difference between a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Stealers&quot;&gt;stealer&lt;/a&gt; and a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What is .net framework and why do I care?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What are some good &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keyloggers&lt;/a&gt;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What are some upsides to&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keyloggers&lt;/a&gt;?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;What are some downsides to keyloggers?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;I want to make my own keylogger. Where do I start?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;I think I&#39;ve been infected with a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;! What do I do?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Conclusion&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: #cccccc; font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;img alt=&quot;[Image: whatisakeylogger.png]&quot; border=&quot;0&quot; src=&quot;http://img222.imageshack.us/img222/4192/whatisakeylogger.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;A &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;  is a program that logs a keyboards keystrokes. It can be used for  several purposes, both black hat and white hat. The most common use is  black hat. A keylogger functions by grabbing a keystroke, triggered by  when the slave presses a key on their keyboard, and saving it to a  variable. This process is called &quot;&lt;span style=&quot;color: #2ac5f8;&quot;&gt;keyboard hooking&lt;/span&gt;&quot;.  It then will take this long variable and send it via a SMTP or FTP  server. You can then view these logs and use it for whatever your  intention may be. Keyloggers have several different features that I will  go into in a later section. The most basic ones only include keyboard  hooking and a way to send the logs.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: #cccccc; font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;img alt=&quot;[Image: learningtheling.png]&quot; border=&quot;0&quot; src=&quot;http://img845.imageshack.us/img845/6192/learningtheling.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;color: white; font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;One  of the most confusing things about starting something new is not  understanding the lingo. If you don&#39;t understand the lingo, how will you  know what people are talking about? In this section I&#39;ll be explaining  the common terms people use concerning&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keyloggers&lt;/a&gt;. I&#39;ll be going over some other more general things as well.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8; font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Logger&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Slang term for keylogger. See the &quot;What is a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;&quot; section.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Hooks&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Slang term for keyboard hooks. These are also explained in the &quot;What is a&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keylogger&lt;/a&gt; section&quot;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Keystrokes&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Section of code that is triggered when the slave types something on the keyboard.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Logs&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Compiliation of all the keystrokes over a period of time.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;FTP&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A webhost that stores files that allows the user to connect and retrieve said files. Files in this case are logs.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;SMTP&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A way that logs are sent via email. Example, MSN, Gmail, Yahoo, etc.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8; font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;FUD&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Full Un-Detected. This means that &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/AntiVirus&quot;&gt;antiviruses &lt;/a&gt;will not detect your file as a virus. This will be further explained in the &quot;&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Crypters%2FBinder&quot;&gt;What is crypting section&lt;/a&gt;&lt;/span&gt;&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;UD&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Undetected. This means that some antiviruses will not detect your files as a virus, while others will.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Server&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A server is the output of your &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;. I will take this in-depth in the&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/07/different-types-of-servers.html&quot;&gt; &quot;&lt;span style=&quot;color: #2ac5f8;&quot;&gt;What is a server?&lt;/span&gt;&quot; &lt;/a&gt;section.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Crypter&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A crypter crypts your file removing detections. I&#39;ll take this in-depth in the &quot;&lt;span&gt;What is crypting&lt;/span&gt;&quot; section.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Detection&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A detection is a term used when an  antivirus detects, or thinks your file is a virus. You always want to  have the least amount of detections possible to increase your success  rate and to reduce errors.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Black hat&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A black hat is someone who uses their knowledge of computers and security for malicious reasons.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;White hat&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A white hat is someone who uses their  knowledge of computers and security for helpful reasons. They help  disinfect and improve others security to combat black hat hackers.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Grey hat&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;A grey hat is a mixture between a black  and white hat. They will infect innocent people and then help them get  rid of it, for free or a price (the latter being more common).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;Backdoored&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2ac5f8;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: white;&quot;&gt;When a file is backdoored it has a virus  binded to it. This means that the file will act normally and the user  will be infected without their knowledge. This has become extremely  common in the keylogger section. Always be wary of new releases.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: #cccccc; font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;img alt=&quot;[Image: commonfeatures.png]&quot; border=&quot;0&quot; src=&quot;http://img844.imageshack.us/img844/7559/commonfeatures.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;As I&#39;ve said before, most &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keyloggers&lt;/a&gt;  have two basic settings. Keyboard hooking and log sending (by FTP or  SMTP). Most keylogger developers (myself included) like to include more  settings to help ease the user experience. Below is a list of common  settings you may find, and what they do:&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Icon Changers&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This will change your viruses icon without corrupting it like some third party programs can do.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;MuteX&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;MuteX is a unique string that you generate. It helps prevent multiple logs from being sent.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Add to Startup&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This will add a registry (or other ways) that will cause your virus to start when the computer is turned on.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Antis&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Antis are a  feature that help keep your virus on the slaves computer for as long as  possible. They disable or stop certain white hat programs such as  antiviruses, sandboxie, and keyscramblers from running or removing your  file.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Disable CMD/Taskmanager/Registry&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This feature will change the registry value for each of these system tools to disable them.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Logging interval&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This allows the user to chose how often logs are sent.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fake Error Message&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This will cause a fake error message to pop up, making it seem less suspicious.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;File pumper&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This will add to the size of your virus. This helps making it seem less suspicious as a game won&#39;t be a few kilobytes.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Assembly Editing&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This allows you  to change things found in the properties menu when right clicking a  file. This helps it seem more like a real file rather than a virus.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Encrypted user information&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This encrtyps your information so that others cannot steal it by decompiling your virus.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Test connection&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;This will test your credentials that you&#39;ve entered to make sure they are correct.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;img alt=&quot;[Image: howdoiuseit.png]&quot; border=&quot;0&quot; src=&quot;http://img708.imageshack.us/img708/2619/howdoiuseit.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px;&quot;&gt;Using a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger &lt;/a&gt;is  a lot easier than it sounds. All you need to do is find one that you  want to use, download it, and then chose your settings. Once you have  entered all your information and chosen your settings, click the build  button. The builder will create your server. This is what you give to  people. Give them this file and when they run it they will be infected  and you will start receiving logs. Pretty self explanitory. If you ever  have a question contact the creator and they should be able to help you.&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: whatisastub.png]&quot; border=&quot;0&quot; src=&quot;http://img688.imageshack.us/img688/2545/whatisastub.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
A stub is a separate binary that contains special code that is required for the&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keylogger&lt;/a&gt; to function. There are&amp;nbsp;&lt;span style=&quot;font-style: italic;&quot;&gt;usually&lt;/span&gt;&amp;nbsp;two things in a&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keylogger&lt;/a&gt;. The builder and the stub. Some&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt; keyloggers&lt;/a&gt;  will have a stub built in. A builder takes the information and settings  you&#39;ve chosen and merges it with a stub. The stub contains keyhooks and  the workings of each feature. These two merge to create your virus,  containing all of the information. I&#39;ll cover this file in the next  section.&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: whatistheserver.png]&quot; border=&quot;0&quot; src=&quot;http://img64.imageshack.us/img64/512/whatistheserver.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
A  server is the ouptput of your keylogging builder. It takes your user  information (the builder) and the actual malicious code (the stub) and  merges the two (via either Code DOM which I&#39;ll explain later in this  section, or by file splitting, which I will also cover) to make one bad  ass file. There are several ways that this is accomplished, and both  ways have their ups and downs. The server is also what you distribute to  infect people. It is your &quot;virus&quot;&lt;br /&gt;
&lt;br /&gt;
CodeDom is a type of building  that generates the code during run time. This allows the user to only  have to download one file (just a builder). After inputting your  information, the builder will take this and combine it with the  malicious code (already inside the builder). This helps lower detection  rates, but overall is harder to do, and is harder to reFUD (you have to  re distribute the entire builder, instead of just providing another  stub).&lt;br /&gt;
&lt;br /&gt;
Filesplitting is the old school way to do things. It  requries taking your information (the builder) and combining it with a  separate file that contains the malicious code. While this makes it  easier to detect, it&#39;s easier to update as you can simply give your  users another file (same thing, just with less detections).&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: whatiscrypting.png]&quot; border=&quot;0&quot; src=&quot;http://img717.imageshack.us/img717/4883/whatiscrypting.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Crypters%2FBinder&quot;&gt;Crypting &lt;/a&gt;can  be very complex, though it isn&#39;t necessary for you to know all of this  information. So for this section I&#39;ll keep things to what you need to  know. &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Crypters%2FBinder&quot;&gt;Crypting &lt;/a&gt;involves  taking a stub (sometimes it&#39;s CodeDOM) and using that to FUD (or lower  your detection rate) your file. The entire process can get a bit  confusing, and I won&#39;t bother getting into it. What you do need to know  is that crypting can easily corrupt your keylogging sever making it no  longer work. A corrupt keylogger may not be detected (the &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Crypters%2FBinder&quot;&gt;crypter&lt;/a&gt;  at least did it&#39;s job) but it will not send logs making it useless.  Because of this you should chose your crypters carefully and it may take  a while to find one that works (for free) with your keylogging server.  If you are buying a crypter (which I recommend) then be sure to ask the  seller to either test or verify your server. In short, &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Crypters%2FBinder&quot;&gt;crypting&lt;/a&gt; is used to lower detection rate, and raise execution rates. That&#39;s all you need to know.&lt;/span&gt;&lt;/div&gt;&lt;div&gt; &lt;span style=&quot;color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;-webkit-border-horizontal-spacing: 1px; -webkit-border-vertical-spacing: 1px; color: #cccccc; line-height: 18px;&quot;&gt;&lt;div style=&quot;font-family: Verdana, Arial, sans-serif; font-size: 13px; text-align: center;&quot;&gt; &lt;img alt=&quot;[Image: differencebetween1.png]&quot; border=&quot;0&quot; src=&quot;http://img855.imageshack.us/img855/8088/differencebetween1.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;br /&gt;
&lt;img alt=&quot;[Image: differencebetween2.png]&quot; border=&quot;0&quot; src=&quot;http://img641.imageshack.us/img641/143/differencebetween2.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: white;&quot;&gt;There is one major defining difference between a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Stealers&quot;&gt;stealer&lt;/a&gt; and a &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/keyloggers&quot;&gt;keylogger&lt;/a&gt;. A &lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/search/label/Stealers&quot;&gt;stealers &lt;/a&gt;purposes  is to steal passwords that have been saved in the browser/application.  Ever logged into something and your browser prompted you to save the  password? This is what stealers steal. They are good for massivley  grabbing passwords and quickly. Once run they do not continue to steal  until run again.&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;img alt=&quot;[Image: whatisnet.png]&quot; border=&quot;0&quot; src=&quot;http://img824.imageshack.us/img824/2525/whatisnet.png&quot; style=&quot;border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;color: white;&quot;&gt;.Net  Framework is a very in-depth concept from Microsoft. While you don&#39;t  need to know (or should you really care) you should know that most  keyloggers are written in Visual Basic .Net, giving it a dependancies.  Depending on who made it (whether they suck or not) you may have to  install a specific version (&lt;a href=&quot;http://download.microsoft.com/download/9/5/A/95A9616B-7A37-4AF6-BC36-D6EA96C8DAAE/dotNetFx40_Full_x86_x64.exe&quot;&gt;.Net 4.0&lt;/a&gt;). Most computers (99%) come with &lt;a href=&quot;http://msdn.microsoft.com/en-us/netframework/aa731542&quot;&gt;.Net 2.0&lt;/a&gt; installed. Your output will also requrie a specific framework (depending on which one you use).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/997231927083884154/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/beginners-guide-to-keylogging.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/997231927083884154'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/997231927083884154'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/beginners-guide-to-keylogging.html' title='A BEGINNERS GUIDE TO KEYLOGGING'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-6083950677663874280</id><published>2011-07-18T12:04:00.000+08:00</published><updated>2011-07-18T12:04:02.189+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Amarok 2.4.2 Beta 1 &quot;Nightshade&quot; Released</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNr-dKP1DMHqcXHmBhQjE0UOECPEMSKy9kwVuCkp-Cmg8IfW6oNEf8MCl2CUVnbadBxhjTt2XL2bDfrXDY4FqYyxTJGIlFaW8dIz1dmg-QSk91NLmms0oZyQeZzw27YezW1fH7daA9aWNl/s1600/amarok-2.4.2-beta1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;297&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNr-dKP1DMHqcXHmBhQjE0UOECPEMSKy9kwVuCkp-Cmg8IfW6oNEf8MCl2CUVnbadBxhjTt2XL2bDfrXDY4FqYyxTJGIlFaW8dIz1dmg-QSk91NLmms0oZyQeZzw27YezW1fH7daA9aWNl/s400/amarok-2.4.2-beta1.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;This  has been a busy spring and early summer in Amarok-land. Developers met  up in Randa, Switzerland and sprinted with a lot of other KDE teams,  including KDE Multimedia. Besides lots of good times, much coding  progress and bugfixing was done too. You will immediately notice a new  streamlined look, and some nice background graphics. The other big  change is in dynamic playlists.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;One  we have been waiting for: drag and drop on Collections, to copy or move  within Local Music, and also directly from the Playlist. We also got  patches for various bugs and wishes: one can now configure the names of  Podcast episodes, thanks to Sandeep Raghuraman, and automatic scrolling  in the Lyrics applet is possible, thanks to Jan Gerrit Marker. Good news  for classical music listeners, you now have the option to scrobble the  composer as artist in Last.fm, thanks to Nicholas Wilson.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;We  also have an updated dynamic playlist which should be easier to  understand. Some of the functionality changes are: New AlbumPlay example  playlist, a Quiz-play bias that will pick a song that starts with the  same character the last one ended with, preventing duplicate tracks.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;And  of course we have quite a few bug-fixes, and changes under the skin.  The changelog below gives a fairly complete overview of the changes in  this beta release. Please help us test it and get it ready for  prime-time.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial,Helvetica,sans-serif; font-size: 19px; font-weight: bold; line-height: 24px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial,Helvetica,sans-serif; font-weight: bold; line-height: 24px;&quot;&gt;Features&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;list-style-type: disc; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 1em; padding-left: 2em;&quot;&gt;&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Made Amarok compile with the Clang LLVM frontend.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Enable drag and drop on collections to copy/move within Local Music and directly from the playlist.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Added KNotify scripting interface.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Make podcast episodes download filename configurable. Patch by Sandeep Raghuraman.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Automatic scrolling in lyrics applet (Thanks to Jan Gerrit Marker)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Option to scrobble composer as artist to Last.fm (Thanks to Nicholas Wilson)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Option&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt; to hide the OSD if another window is taking the full screen&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3 style=&quot;line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 style=&quot;line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-size: x-small;&quot;&gt;Changes&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;ul style=&quot;list-style-type: disc; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 1em; padding-left: 2em;&quot;&gt;&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Again write back ratings only if option is selected.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Moved the queue-editor action to the main menu under playlist to save space. Queue editor now has a shortcut: Meta+U.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Removed the redo action from the playlist toolbar to make it less wide.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Made some playlist toolbar actions collapse into a menu button for use on small screens.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Removed the statusbar. Moved progress info &amp;amp; messages to the Media Sources dock.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Removed the preview button and checkbox from the organize collection dialog.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;General user interface cleanup (addition of browser widget backgrounds, etc.)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Removed the add button in the context toolbar. Applet explorer is opened on config.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Easier to understand Dynamic playlists&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Made Amarok depend ffmpeg-0.6 or newer.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Use KImageCache if possible (kdelibs 4.5.0 and later), which should reduce the number of cache&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;-related crashes.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3 style=&quot;line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 style=&quot;line-height: 1.3em; margin-bottom: 0.769em; margin-top: 0.769em;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-size: x-small;&quot;&gt;Bugfixes&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;ul style=&quot;list-style-type: disc; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 1em; padding-left: 2em;&quot;&gt;&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Don&#39;t let the album applet freeze Amarok for ages on track change.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed cover fetching from Google Images.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed a crash in the equalizer dialog when selecting &quot;Off&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fix finalization of track copy process to media device collections.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed crash on MusicBrainz search.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Avoid crash in ContextView when accessing Plasma::Applet::view().&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed playlist tooltip getting too tall for multiline comments.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Made equalizer keywords (dB,kHz,...) translatable.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Made equalizer preset names translatable.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed runtime error reporting of scripts.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed &quot;Happy&quot; moodbar theme.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed crash for invalid scripts trying to be stopped by the manager.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed collection menu items ordering.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed top level podcast location setting.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fixed double-clicking in collection using left-handed mouse setting.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;a href=&quot;http://amarok.kde.org/wiki/Download&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif;&quot;&gt;DOWNLOAD&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/6083950677663874280/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/amarok-242-beta-1-nightshade-released.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6083950677663874280'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/6083950677663874280'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/amarok-242-beta-1-nightshade-released.html' title='Amarok 2.4.2 Beta 1 &quot;Nightshade&quot; Released'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNr-dKP1DMHqcXHmBhQjE0UOECPEMSKy9kwVuCkp-Cmg8IfW6oNEf8MCl2CUVnbadBxhjTt2XL2bDfrXDY4FqYyxTJGIlFaW8dIz1dmg-QSk91NLmms0oZyQeZzw27YezW1fH7daA9aWNl/s72-c/amarok-2.4.2-beta1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-7886475977079051881</id><published>2011-07-18T04:13:00.000+08:00</published><updated>2011-07-18T04:13:00.283+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><title type='text'>SQL INJECTOR V1.0.2</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXE0-Hka-ptH1eYg_BOQb1t2cNgRvdSlU73aXZhUx4ctIm8gLfATSa7JfukqVNRoOnaYSMz1-4MD-K2eu2tnS-EqGoIxAp_gwSyR1wnZ_4NRnXZEX_OqFYTTbJQK4sV21fPOSnhyphenhyphenCmxOA/s1600/ebc0638512eaa682a30e0c4d6db2f96a_mediums.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXE0-Hka-ptH1eYg_BOQb1t2cNgRvdSlU73aXZhUx4ctIm8gLfATSa7JfukqVNRoOnaYSMz1-4MD-K2eu2tnS-EqGoIxAp_gwSyR1wnZ_4NRnXZEX_OqFYTTbJQK4sV21fPOSnhyphenhyphenCmxOA/s320/ebc0638512eaa682a30e0c4d6db2f96a_mediums.png&quot; width=&quot;291&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;SqlInjector is an application to perform completely blind SQL injection. Currently it only supports MS&lt;br /&gt;
SQL Server. It uses time and true/false based inference to conditions to extract data. The key feature&lt;br /&gt;
is that it uses a binary search mechanism to reduce the character search address space; this means it&lt;br /&gt;
can get each character value within 7 to 8 requests.&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Features&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Binary search for faster character identification&lt;br /&gt;
Completely blind injection using time based inference&lt;br /&gt;
True/False inference&lt;br /&gt;
Supports MS SQL Server&lt;br /&gt;
Extracts database name&lt;br /&gt;
Extracts current user&lt;br /&gt;
Extracts server version&lt;br /&gt;
Extracts table names&lt;br /&gt;
Extracts column names&lt;br /&gt;
Extracts column data types&lt;br /&gt;
Extracts column lengths&lt;br /&gt;
Configurable space encoding&lt;br /&gt;
Configurable wait timing&lt;br /&gt;
Tree view display of enumerated data&lt;br /&gt;
Resume support&lt;br /&gt;
Save/Loading of project files&lt;br /&gt;
Proxy support&lt;br /&gt;
Authentication support (Basic, Negotiate, Digest, NTLM, X509)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;a href=&quot;http://www.woanware.co.uk/downloads/SqlInjector.v.1.0.2.zip&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/7886475977079051881/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/sql-injector-v102.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7886475977079051881'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7886475977079051881'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/sql-injector-v102.html' title='SQL INJECTOR V1.0.2'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXE0-Hka-ptH1eYg_BOQb1t2cNgRvdSlU73aXZhUx4ctIm8gLfATSa7JfukqVNRoOnaYSMz1-4MD-K2eu2tnS-EqGoIxAp_gwSyR1wnZ_4NRnXZEX_OqFYTTbJQK4sV21fPOSnhyphenhyphenCmxOA/s72-c/ebc0638512eaa682a30e0c4d6db2f96a_mediums.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-7220539018471619108</id><published>2011-07-18T03:11:00.000+08:00</published><updated>2011-07-18T03:11:00.538+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="SQL"/><title type='text'>BSQL HACKER</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtyYo4ktEAXWEI_F9g_QYkmd45Qo5HTit7LnaNyEPj-cJuhpbPwD8HABdwI7yRu1c0dMBVMwuh6pAiCpWDN-ysAMtOKy6TP8aCAi8BQbSCGP9v0J5yLCXiRPBSVsov2tgWO8rgQ-5Tx70/s1600/gregfkltefjnl.gif.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;301&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtyYo4ktEAXWEI_F9g_QYkmd45Qo5HTit7LnaNyEPj-cJuhpbPwD8HABdwI7yRu1c0dMBVMwuh6pAiCpWDN-ysAMtOKy6TP8aCAi8BQbSCGP9v0J5yLCXiRPBSVsov2tgWO8rgQ-5Tx70/s320/gregfkltefjnl.gif.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;BSQL Hacker&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;is an automated SQL Injection Framework / Tool designed to exploit SQL injection vulnerabilities virtually in any database.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;BSQL  Hacker aims for experienced users as well as beginners who want to  automate SQL Injections (especially Blind SQL Injections).&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;It&#39;s  easy to use for beginners and provide great amount of customisation and  automation support for experienced users. Features a nice metasploit  alike exploit repository to share and update SQL Injection exploits.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; line-height: 18px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;Key Features&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Easy Mode&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;SQL Injection Wizard&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Automated Attack Support (database dump)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;ORACLE&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;MSSQL&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;MySQL (experimental)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;General&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Fast and Multithreaded&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;4 Different SQL Injection Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Blind SQL Injection&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Time Based Blind SQL Injection&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Deep Blind (based on advanced time delays) SQL Injection&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Error Based SQL Injection&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Can automate most of the new SQL Injection methods those relies on Blind SQL Injection&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;RegEx Signature support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Console and GUI Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Load / Save Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Token / Nonce / ViewState etc. Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Session Sharing Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Advanced Configuration Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Automated Attack mode, Automatically extract all database schema and data mode&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Update / Exploit Repository Features&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Metasploit alike but exploit repository support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Allows to save and share SQL Injection exploits&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Supports auto-update&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Custom GUI support for exploits (cookie input, URL input etc.)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;GUI Features&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Load and Save&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Template  and Attack File Support (Users can save sessions and share them. Some  sections like username, password or cookie in the templates can be show  to the user in a GUI)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Visually view true and false responses as well as full HTML response, including time and stats&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Connection Related&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Proxy Support (Authenticated Proxy Support)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;NTLM, Basic Auth Support, use default credentials of current user/application&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;SSL (also invalid certificates) Support&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Custom Header Support&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Injection Points (only one of them or combination)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Query String&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Post&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;HTTP Headers&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Cookies&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Other&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Post Injection data can be stored in a separated file&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;XML Output (not stable)&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;CSRF  protection support (one time session tokens or asp.net viewstate ort  similar can be used for separated login sessions, bypassing proxy pages  etc.)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;a href=&quot;http://bsqlhacker.googlecode.com/files/BSQL%20Hacker%20Manual.pdf&quot; style=&quot;color: #539e01; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: orangered;&quot;&gt;BSQL Hacker Manual.pdf&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;&amp;nbsp;1.1 MB&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-weight: bold; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red; font-family: Arial,Helvetica,sans-serif; text-decoration: underline;&quot;&gt;&lt;a href=&quot;http://code.google.com/p/bsqlhacker/downloads/detail?name=BSQLHackerSetup-0909.exe&quot; style=&quot;text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/7220539018471619108/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/bsql-hacker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7220539018471619108'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/7220539018471619108'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/bsql-hacker.html' title='BSQL HACKER'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtyYo4ktEAXWEI_F9g_QYkmd45Qo5HTit7LnaNyEPj-cJuhpbPwD8HABdwI7yRu1c0dMBVMwuh6pAiCpWDN-ysAMtOKy6TP8aCAi8BQbSCGP9v0J5yLCXiRPBSVsov2tgWO8rgQ-5Tx70/s72-c/gregfkltefjnl.gif.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7846611742988552626.post-1882051277223646312</id><published>2011-07-18T01:48:00.000+08:00</published><updated>2011-07-18T01:48:22.660+08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backtrack 5"/><title type='text'>10 Steps to Set Up Armitage in Backtrack for Penetration Test</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirUKX7cDx79wvyNF7M4Hunt6W3reXZMXBHAO2DEuWCIXznwlFCCrXq6h7epCHTg7TPUIJZijUr-KVMug0j3Kh3gJnLjHnyIPA2gLYPu6KTntsdxL0ON_bAIZzriiBuWgMxNiWWm75WaNjo/s1600/armitage.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirUKX7cDx79wvyNF7M4Hunt6W3reXZMXBHAO2DEuWCIXznwlFCCrXq6h7epCHTg7TPUIJZijUr-KVMug0j3Kh3gJnLjHnyIPA2gLYPu6KTntsdxL0ON_bAIZzriiBuWgMxNiWWm75WaNjo/s1600/armitage.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;What is Armitage?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Armitage  exists to help security professionals better understand the hacking  process and appreciate what&#39;s possible with the powerful Metasploit  framework. Security professionals who understand hacking will make  better decisions to protect you and your information.&quot; I copy that  paragraph from &lt;a href=&quot;http://www.fastandeasyhacking.com/faq&quot;&gt;Fast and Easy Hacking FAQ&lt;/a&gt;,  but in a simple way to explain what is Armitage, in my opinion it&#39;s  tools that make you learning about Netowork Security, Metasploit, and  NMap more easier because this tools make all of that tools(Metasploit,  NMap) in visual way not a command line. Just a few click and you will  know the flow of an attack happen in the network.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;Read here for latest &lt;/span&gt;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/06/how-to-set-up-armitage-in-backtrack-5.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Backtrack 5 Armitage tutorial&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Requirement :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;1.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/04/backtrack-4-r2-release-full-dvd.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;Backtrack 4r2&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;2.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://adf.ly/1wO3y&quot;&gt;Armitage&lt;/a&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;(apt-get install armitage from your Backtrack Box)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;3.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://adf.ly/1wO3z&quot;&gt;Java 1.6.0+&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;4.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://adf.ly/1wO7E&quot;&gt;Metasploit 3.5+&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;5. Database (&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://adf.ly/1wOAh&quot;&gt;PostgreSQL&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;, &lt;/span&gt;&lt;a href=&quot;http://adf.ly/1wOAi&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;MySQL&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;) –&amp;gt; In this tutorial we use MySQL; PostgreSQL usually used when you use Backtrack 4r1 &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Step By Step :&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;If you still unfamiliar with Backtrack, you can read my previous post about &lt;/span&gt;&lt;a href=&quot;http://rupeshhacktheworld.blogspot.com/2011/06/useful-things-in-backtrack-linux.html&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;5 useful things in Backtrack Linux&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;1.  I assume you have already installing Armitage by using apt-get install  armitage. The next step is update your metasploit to the latest version  by using msfupdate command. This is needed to update our exploit  database to the latest version.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;v4L@bt:~# /pentest/exploits/framework3/msfupdate&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLklcaZhBLSbdw6AdY9a5MoqcMSdfCjZ_wpYwQNj3svTwv3oMVGgDF8cI2tU0WxfY9numO2xTHGyqMNAqaOUKLPpL0oySfv70Zr-CrodsYPl8egKDdTJtX7Y1d1KrTfKxLUnO-8wrNRfd/s1600/armitage1.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLklcaZhBLSbdw6AdY9a5MoqcMSdfCjZ_wpYwQNj3svTwv3oMVGgDF8cI2tU0WxfY9numO2xTHGyqMNAqaOUKLPpL0oySfv70Zr-CrodsYPl8egKDdTJtX7Y1d1KrTfKxLUnO-8wrNRfd/s1600/armitage1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;2. The next step is enabling RPC Daemon for metasploit, in this case we will use SSL to interact with metasploit.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;v4L@bt:~# /pentest/exploits/framework3/msfrpcd -f -U msf -P test -t Basic&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTGeffIB0K852g8t7n9OE5fVE_B1TL6MqJjd2oIhbMfH7IedBzorjER3ytHpOq5kO36Jyv1jB4-IkmOYIrzfyCMF01MHv2urfbn0oL1QZ1Z2bi-XiH1gHdWGQTcDj6pLjbVsNh04M3K0bV/s1600/armitage2.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTGeffIB0K852g8t7n9OE5fVE_B1TL6MqJjd2oIhbMfH7IedBzorjER3ytHpOq5kO36Jyv1jB4-IkmOYIrzfyCMF01MHv2urfbn0oL1QZ1Z2bi-XiH1gHdWGQTcDj6pLjbVsNh04M3K0bV/s1600/armitage2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;The above command will start the msfrpcd with the user msf, password test, SSL listener, on the default port 55553.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;3. After setting up the MSRPC Daemon, the next step is turn on our database service (I will use MySQL)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;v4L@bt:~# /etc/init.d/mysql start&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjASKIDNth3zRWBOfhXalhlWzk-zA042rCaz5cW7RqA3ZZdWxKY9YwcaPZFrvyixO5DkY2NWUUpuZTD_KrqNSZySJEibJwki546HSejx0K9mY4AxNyfx7dPon_YAiOrbm0JIB70MICai91E/s1600/armitage3.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjASKIDNth3zRWBOfhXalhlWzk-zA042rCaz5cW7RqA3ZZdWxKY9YwcaPZFrvyixO5DkY2NWUUpuZTD_KrqNSZySJEibJwki546HSejx0K9mY4AxNyfx7dPon_YAiOrbm0JIB70MICai91E/s1600/armitage3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;4.  The step 1-3 is the needed step to make sure Armitage running correctly  without error. If everything is okay, the next step is run the Armitage  inside /pentest/exploits/armitage/, so we need to change the directory  first.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;v4L@bt:~# cd /pentest/exploits/armitage/ v4L@bt:/pentest/exploits/armitage# ./armitage.sh&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3VMSjSVY6U_EMIGMURGZ-JsNiwRzYBE-OeAZJxA3qRA6GXLwRBdfdRNUw1cXd_54RX3GW1maSmFCc9rW6jKBU5XR3d68uNeekhf9Io7biyaZdCk2JKGZ6VGjDoGXpMRg9VKaZciRlnDji/s1600/armitage4.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3VMSjSVY6U_EMIGMURGZ-JsNiwRzYBE-OeAZJxA3qRA6GXLwRBdfdRNUw1cXd_54RX3GW1maSmFCc9rW6jKBU5XR3d68uNeekhf9Io7biyaZdCk2JKGZ6VGjDoGXpMRg9VKaZciRlnDji/s1600/armitage4.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;5.  After the ./armitage.sh command, there&#39;s should appear new window to  connect to MySQL and mysql msfrpcd. Make sure everything is correct and  also check the Use SSL checklist. If everything is OK, click&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;CONNECT&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhka5ufMsMlvQxnUPaajUuiGk78YIyWB-aU97w_BMR7TXXnZMEwvbxBo5zrLVYI59F6y0JDn7XCnt0kdGQhHzD8-1y2zSLqTgZKlZWDfs3oAm0xWy2dRcWg77YIR7lg8o-xIKzWocNduQY/s1600/armitage5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;265&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhka5ufMsMlvQxnUPaajUuiGk78YIyWB-aU97w_BMR7TXXnZMEwvbxBo5zrLVYI59F6y0JDn7XCnt0kdGQhHzD8-1y2zSLqTgZKlZWDfs3oAm0xWy2dRcWg77YIR7lg8o-xIKzWocNduQY/s320/armitage5.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;6.  Here&#39;s the main window of Armitage, at the top of application there&#39;s a  menu, on the left side there&#39;s auxiliary, exploits, and payload from  metasploit, and at the bottom of application there&#39;s MSFConsole.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #6aa84f; font-family: Arial, Helvetica, sans-serif; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBmXJmvgyW3QqGEu_vUUIvBt1Z7JeWKqPEEE_2u2uIt4tF4AOhHPeT4zRI3vBTZ-xszK8p9Gn2aqsx8HzLNDomIb4_AlrfWrsthLvseG_5lK8MPQ8ehrndpqid-bVEkqAX1OnlYTgngNI/s1600/armitage6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhBmXJmvgyW3QqGEu_vUUIvBt1Z7JeWKqPEEE_2u2uIt4tF4AOhHPeT4zRI3vBTZ-xszK8p9Gn2aqsx8HzLNDomIb4_AlrfWrsthLvseG_5lK8MPQ8ehrndpqid-bVEkqAX1OnlYTgngNI/s320/armitage6.jpg&quot; width=&quot;303&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;7.  The next step we need to add host(s). We also can use NMap to scan  whole network or specific IP Address. In this case I will use &quot;Quick  Scan(OS Detect)&quot; using NMap to find alive hosts in my network.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGwmokJ9O7blRaF3khZ5F1z2OABRBRAVYMUM68YPa-npmPPysGiVbSlYSn28TRHG0D51MLkWXVCVY1VdivBcIRprmUZVJEGFSm_OhZJxlNZsDveEaKKIdD1rNq5o8C1VCrJpdbNnvoQD0/s1600/armitage7.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGwmokJ9O7blRaF3khZ5F1z2OABRBRAVYMUM68YPa-npmPPysGiVbSlYSn28TRHG0D51MLkWXVCVY1VdivBcIRprmUZVJEGFSm_OhZJxlNZsDveEaKKIdD1rNq5o8C1VCrJpdbNnvoQD0/s320/armitage7.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;My network address is 192.168.1.0/24 class C.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAmgemFYlk1JizHdHjlypqwni55DvSBPiHk32lsnAqGOWKgvB3TSzYR9PiPFb86R0TGpBw4uns03D29aMAK-mXlm3NtS0v3_yi_pKarFbF5cLIVSIqP6atmvGwbVZlDfQrQ_X3SHjQH2Y/s1600/armitage8.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;126&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAmgemFYlk1JizHdHjlypqwni55DvSBPiHk32lsnAqGOWKgvB3TSzYR9PiPFb86R0TGpBw4uns03D29aMAK-mXlm3NtS0v3_yi_pKarFbF5cLIVSIqP6atmvGwbVZlDfQrQ_X3SHjQH2Y/s320/armitage8.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;You  need to wait until the tasks completed. Usually it depends on scanning  type, if you use intense scan will take more time than quick scan. Below  is the picture when it finish doing the task.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9R6SjRc_8DWJDN5TMzwomwMJxkeYWbSIgAAcPtXmOTvrTCrHhkTtXJifFBLfvmfvdSa_Fn8nxriKeAhReoQLLj9Qw-nmrEzKeraEVxVGkCeUi6xlXokfNXwWjzPa2g62vpXfJyHaEXIg/s1600/armitage9.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;155&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9R6SjRc_8DWJDN5TMzwomwMJxkeYWbSIgAAcPtXmOTvrTCrHhkTtXJifFBLfvmfvdSa_Fn8nxriKeAhReoQLLj9Qw-nmrEzKeraEVxVGkCeUi6xlXokfNXwWjzPa2g62vpXfJyHaEXIg/s320/armitage9.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;If the tools found alive hosts it will be shown like the picture below(also the OS).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg6D1dHuQp8Z5CQskQzPuteKbN7PV7bEEUDkE8Y5vmwnLe7szhCZ2OgaFFsX6L05fPBzTZr7qo3PNsOgXOzNJuZ99X0Dd2Q0TwXfIAsrIrtkZnOqOYPS2dgQG3RLwTxR4jO1_YG2ZEPtg/s1600/armitage10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;196&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg6D1dHuQp8Z5CQskQzPuteKbN7PV7bEEUDkE8Y5vmwnLe7szhCZ2OgaFFsX6L05fPBzTZr7qo3PNsOgXOzNJuZ99X0Dd2Q0TwXfIAsrIrtkZnOqOYPS2dgQG3RLwTxR4jO1_YG2ZEPtg/s320/armitage10.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;8. From the previous image it shows that we need to find some attacks available for the listed hosts.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiTD8cNbydrbdWRWqMSoE-D4ZByHJph6xhidIrCwMgHq5GJpfg_FULNsVZeaDzyrI-EFVdKwlChfWQ9AvlpvBfYVl2j0V4-EaFEYcXu3_Myda3JcmHHwjPOOLNztCsxLr4g17felbdJ_A/s1600/armitage11.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;167&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiTD8cNbydrbdWRWqMSoE-D4ZByHJph6xhidIrCwMgHq5GJpfg_FULNsVZeaDzyrI-EFVdKwlChfWQ9AvlpvBfYVl2j0V4-EaFEYcXu3_Myda3JcmHHwjPOOLNztCsxLr4g17felbdJ_A/s320/armitage11.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;You  can use automated attack finder from armitage who will find the most  suitable attacks for the hosts listed. you can choose both &quot;by Port&quot; or  &quot;by Vulnerability&quot;. If attack analysis has finished the application will  inform you like the picture below.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBPB95N-qLNHJbY4dE15_68_8rBOWOKPqeFvGpKWe8CPdAylh2NK4jEyTc3lb0pfUMw13U9q7a-IxlUXlajCvlKMj7M2qKotxLLmQ8V88wdcSdDgUEoci-YiqgCGDlyLMvEdxPLoV7kGM/s1600/armitage12.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;169&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBPB95N-qLNHJbY4dE15_68_8rBOWOKPqeFvGpKWe8CPdAylh2NK4jEyTc3lb0pfUMw13U9q7a-IxlUXlajCvlKMj7M2qKotxLLmQ8V88wdcSdDgUEoci-YiqgCGDlyLMvEdxPLoV7kGM/s320/armitage12.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;9. In this example I will try the MS08_067 vulnerability in Windows.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSAMsutgeaK91AncHYsCToS1C_z4-6S0YB6V9aFpXN_twJZuAUcd2Pspry3WzRTFvvzTkv-QW-FwprFrL71m_Zf531lkzr-omo3Wqrel8p6xQEhls59Auq7LvoRT8-Z6HHmkeQvjmJCNA/s1600/armitage13.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSAMsutgeaK91AncHYsCToS1C_z4-6S0YB6V9aFpXN_twJZuAUcd2Pspry3WzRTFvvzTkv-QW-FwprFrL71m_Zf531lkzr-omo3Wqrel8p6xQEhls59Auq7LvoRT8-Z6HHmkeQvjmJCNA/s1600/armitage13.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The  next step is the same when you use metasploit framework. If you  confused in this steps, you can use automated exploitation (leave all  the options default), then click&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;LAUNCH&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt; &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;and wait.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7ag1b5UGqVfFQvPj51Q-t9ixqpncjcg938bhKafJTaALHjalCW0RIyG-iRQj36RwU_3FhzqGbUy9t4wj3BnCczUY2OeEX264vYSd8fW60ajxirY2BnvTPiij1OAGOBS4501BvVesFq6o/s1600/armitage14.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7ag1b5UGqVfFQvPj51Q-t9ixqpncjcg938bhKafJTaALHjalCW0RIyG-iRQj36RwU_3FhzqGbUy9t4wj3BnCczUY2OeEX264vYSd8fW60ajxirY2BnvTPiij1OAGOBS4501BvVesFq6o/s320/armitage14.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;10.  If the targeted hosts is vulnerable with the attack, the color will be  changed into red, that&#39;s mean that we can breach into the computer.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7ag1b5UGqVfFQvPj51Q-t9ixqpncjcg938bhKafJTaALHjalCW0RIyG-iRQj36RwU_3FhzqGbUy9t4wj3BnCczUY2OeEX264vYSd8fW60ajxirY2BnvTPiij1OAGOBS4501BvVesFq6o/s1600/armitage14.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7ag1b5UGqVfFQvPj51Q-t9ixqpncjcg938bhKafJTaALHjalCW0RIyG-iRQj36RwU_3FhzqGbUy9t4wj3BnCczUY2OeEX264vYSd8fW60ajxirY2BnvTPiij1OAGOBS4501BvVesFq6o/s320/armitage14.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;The next step is right click the &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;hosts&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;  and as you can see on the above picture, I choose the command shell to  interact with the victim. I think you should know what happen next when I  click that option &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #674ea7;&quot;&gt;&lt;b&gt;PWNED&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white;&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #84878e;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: white; font-family: Arial, Helvetica, sans-serif;&quot;&gt;I  hope this tutorial is useful for you, especially for you who want to  tests your personal network from security breach by using metasploit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rupeshacktheworld.blogspot.com/feeds/1882051277223646312/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/10-steps-to-set-up-armitage-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1882051277223646312'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7846611742988552626/posts/default/1882051277223646312'/><link rel='alternate' type='text/html' href='http://rupeshacktheworld.blogspot.com/2011/07/10-steps-to-set-up-armitage-in.html' title='10 Steps to Set Up Armitage in Backtrack for Penetration Test'/><author><name>King Of Hackers</name><uri>http://www.blogger.com/profile/02091388154740636250</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirUKX7cDx79wvyNF7M4Hunt6W3reXZMXBHAO2DEuWCIXznwlFCCrXq6h7epCHTg7TPUIJZijUr-KVMug0j3Kh3gJnLjHnyIPA2gLYPu6KTntsdxL0ON_bAIZzriiBuWgMxNiWWm75WaNjo/s72-c/armitage.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>