Showing posts with label RAT setup. Show all posts
Showing posts with label RAT setup. Show all posts

[RAT]How To Setup CyberGate 1.02.0 (THE CORRECT WAY!), No-IP, & Port Forward [TUT]

Many People Have Been Setting Up CyberGate Servers Wrong With The New CyberGate As Shown In The Other CyberGate 1.02.0 Guide. So even if you know how to use CyberGate, it is recommended you look at Part 3 of this tutorial (3. Building Your CyberGate Server) and scroll down to Number 8 to see the correct way of creating a server in CyberGate 1.02.0.

1. Setting Up No-IP

1. Go to http://www.No-ip.com

2. Create an account and log in, then press Add Host.

3. Now name your host to whatever you want. For example I will name my host xzxmikedxzx.no-ip.biz. Just follow these settings and press Create Host.

[Image: 26790935.jpg]

4. Now go here - https://www.no-ip.com/downloads.php and download No-IP's Dynamic DNS Update Client,

5. Once downloaded, install it. Then open it up and put in your account name and password. Then it should update, after it does check the box next to your no-ip host.

It should look something like this:

[Image: newlc.jpg]

You are now finished setting up No-IP!

2. Setting Up CyberGate

1. Download CyberGate and open it. You can find the download in Cyber-Sec's forum, which you need at least 5 posts to obtain - http://www.cyber-sec.org/forum/ or you can download it here - http://www.mediafire.com/?mmwwnj5ofzz

2. Now click Control Center - Start

3. Click Control Center - Options - Select Listening Ports And Do Following:

[Image: 32695328.jpg]

You are now done with setting up CyberGate!

3. Building Your CyberGate Server

1. Click Control Center - Builder - Create Server. Make a user named Hacker and press Ok.

[Image: 79780787.jpg]

2. Mark the user "Hacker" And press Forward.

3. Press 127.0.0.1 | Port 999 and press Delete:

[Image: 61496758.jpg]

4. After that, Click Add.

5. A Box should pop up saying: 127.0.0.1:81. Remove everything and change it with the No-ip address host you added. So let's say you used example.no-ip.biz. Change 127.0.0.1:81 to example.no-ip.biz:82. So it should look like this:

[Image: 79540144.jpg]

6. Now Change the
Identification: remote
Password: cybergate

To This:
Identification: Cyber
Password: 123456

7. Go to the next tab "Installation"

8. Use the Exact same settings as i do:

[Image: newn.jpg]

Important Info:
Most people set the Installation Directory as System. I talked to jonhyk (the creator of cybergate) and he advised not to do this when using UAC bypass (which you want on). This is because, from jonhyk himself, "cybergate is not able to write into protected folders if UAC is enabled". I also don't use Winlogon.exe for the File Name because Windows Defender catches cybergate if you do so. So it is best using my settings as shown above
.

9. Now Skip the Message, Keylogger, and Anti Debug tabs, since these are already set up right for us.

10. In The Build Server have the exact same settings checked as I do.

Except Google Chrome Passwords is optional. If you would like to have it checked like I do, go to http://www.110mb.com and create an account. Then log in to your account and go to file manager. Then click upload and upload sqlite3.dll (it is located in the same folder cybergate is located on your computer). Then once you check Google Chrome Passwords on Cybergate it will ask for a link, put in http://www.username.110mb.com/sqlite3.dll

[Image: 21251752.jpg]

11. Press Create Server and save the settings.

You are now done creating you server!

4. Forwarding Your Ports, If You Have Not Done So

Your now going to have to forward port 82 on your router if you have not done so, this is how:

1. Click Start on your computer and click Run. If you have Vista and I think Windows 7, you need to search Run in the search bar in the start menu, then click Run.

2. Type cmd and hit enter.

3. type ipconfig and press enter.

4. You should see something like this, write down or remember these last digits that I selected in the picture below:

[Image: newa.jpg]

5. Now go to http://www.portforward.com

6. Scroll down and select your router.

7. Scroll down and you should see a bunch of programs, click "1st SMTP Server"

8. You should see at the top telling you to enter your static IP

[Image: newzi.jpg]

9. Type in the digits I had you remember in step 4. My digits were 114 so I entered that.

10. Now just follow the tutorial, but when it says forward port 25, forward port 82 instead.

11. Once you are done, go to http://www.canyouseeme.org

12. Type in 82 in the box next to "What Port?" and click check.

13. If you got "Error: I could not see your service on IP ADDRESS HERE on port (82) Reason: Connection refused" Make sure your firewall is off and try again.

14. You should get "Success: I can see your service on ADDRESS HERE on port (82) Your ISP is not blocking port 82"

Port 82 should now be open!

5. Crypting Your Server To Make It FUD (Fully Undetectable To Anti-Viruses)

I have used MANY crypters before. Some are decent and others are not so good. The very best crypter I have ever used and I still use is Darty Crypter and I recommend everyone to get this crypter if you want to keep your server FUD and stable.

[Image: darty.png]


Your server is now completely FUD and ready to go, have fun spreading your server without your victims knowing they have a virus!

You are now done with everything, have fun using CyberGate!

Hope you liked this tutorial, took a lot of time making it. Please Say Thanks!
READMORE
 

[RAT]Blackshades NET Complete [Tutorial]


Blackshades is the best RAT available in the Internet till now and it seems to be like many have problems using it,so here

is a walkthrough:

Unit 1: Port Forwarding
Unit 2: Setting up Blackshades NET
Unit 3: Connecting to your slave
Unit 4: Special Features


Unit 1: Port Forwarding

First we need to port forward to send and recieve connections through Blackshades NET so follow these steps to forward your

ports

Step 1:Go to your router's settings page,Its usually 10.0.0.1 or 192.168.1.1 after trying this into

your address bar of your web browser you will be asked for login settings,login to your router by typing the username and

password.After loging in you will see this page

Note:These might not be applicable to all routers.If you find any difficulties please visit http://www.portforward.com

Setp 2:Now go to Port Forward settings(usually under Advanced settings) and then
click "Add Custom Service" and then type any name for it and then select service type as Both or TCP/UDP and starting port

as "port number number",ending port as "port number".And the server ip address as your LAN IP(You can find by typing

ipconfig in CMD.Its the ipv4 you need to type).For Blackshades we use 2 ports so forward 2 ports.

[Image: pf2.png]

Thats it,you are done with Port Forwarding :)

Unit 2: Setting up Blackshades NET

Step 1:Open client.exe to launch Blackshades NET and then you are automatically logged in to

Blackshades Client

Setp 2:Now click "Create Server" tab and right click in "profiles pane" and select "Create new" and

enter a profile name for it and click ok.

Step 3:Type your No-IP or DynDNS address into the "IP/DNS" area
Note:To create a No-IP address goto No-IP.com and register an account there and select "Add Host" and create one.

[Image: noipe.png]

Step 4:Type the Ports that you forwarded.First port as "Port",second port as "Transfer Port"

Step 5:Name anything as your "Server ID",its just to identify the slave.You dont want to disturb

the "Encryption Key"!

Step 6:Enter the "Filename" for the server that would be created.You can use "Hide File" feature if

you want a silent execution of the server file.

Step 7:Select the "Install path" for the server to get installed,either "Application data" or "Temp

directory"

Step 8:Select the "Install mode" for the server whether to Install,Melt,Protect Process.Note:

(Optional step)

Step 9:You can set the "Delay" time for the connection between your client and the server here.

Step 10:Enter "HKCU" as something which appears like a system name,eg:WinNT and Use "Startup"

feature if you want to server to run each time the computer is restarted.Note:(Optional step)

Step 11:Generate "ActiveX" if you had selected "Startup" feature.Note:(Optional Step)

Step 12:Generate "Mutex" for the server by clicking "Generate"

Step 13
:Click "Infect USB" if you want to infect the slave's USB with your virus,select "Compress with UPX" if you

want to compress your server size.Select "Change Icon" if you want to change the icon.Select "Clone File Information" if

you want to clone some file's information.Note:(Optional step)

Step 14:Click "Save" to save your profile information.Note:(Optional step)

Step 15:Click "Build" to create your server

[Image: builddy.png]

Thats it the server is now built :D

Unit 3: Connecting to your slave


Step 1:The server file that has been generated should be ran on the slave's PC.You need to send the

file to the slave with the server being crypted and binded or else the slave will find out that its a Virus.Note:Crypting

and Binding is an Optional step.

Step 2:Go to "Settings" tab and enter the two forwarded ports.First Port as "Connection Port" and

Second Port as "Transfer Port".

Step 3:Click "Activate" buttons for both "Connection Port" and "Transfer Port"

Step 4:After activating the 2 ports you can test them by clicking on "Test Port" adjacent to the

"Activate" buttons if the ports are forwarded correctly.


[Image: connectiond.png]

Step 5:After doing all,goto "Connections" tab to view and control all your slave computers.


[Image: connected.png]

Thats all!You are now connected with your slave PCs ;)

Unit 4: Special Features

This is a small guide explaining the Special and unique Features of Blackshades NET

1)Asynchronus Mode:

Asynchronus mode is used for very holding large number of bots.
This mode does not connect all the bots to your computer at the same time which might cause instability but keeps the bots

at stake.That is you wont be connected to all the bots at the same time but you can connect to specific bots whenever you

want to and at the other time you keep them at stake.

Step 1:Goto "Settings" tab and select "Asynchronous Mode" and then the bots will connect in

Asynchronous mode.

Step 2:To control a specific slave just select any function that you want to perform just as you do

normally and then Blackshades will ask you if you want to establish connection between the slave and your PC,select Ok.


[Image: asyncmode.png]

Note:The connection time may take a while when doing this.

2)Station:

The station feature in Blackshades is similar to the normal Server but it reduces the quality of the server.The usage of

the Station is only when if you want to connect to someone's PC securely.That is,the slave cannot traceback that it is you

who has RATted the slave.

Step 1:Create a Station just like you did when creating a server but just use different No-IP or

DynDns address as your "Master IP/DNS".Its better to use different "Mutex","HKLM" if you use both "Sever" and "Station"

Step 2:Set "Master port" as 80 and "Master Transfer Port as "3389" and "Bot Port" as the Fist Port

that you forwarded and "Bot Transfer Port" as the Second Port that you forwarded.

Step 3:Click "Build" to create the Station

3)On-Join Feature:

The On-Join Feature will basically execute the command that you have set whenever a specific bot or all bots connect to

your Client.
The tasks that could be performed are:
i)Dload.Exec => Download and Execute -This will download and execute a file on the slave PC
ii)Update - This will update the server/station on the slave PC by replacing your previous file.
iii)Keylog - This will start Keylogging the slave's PC
iv)Password - This will steal all the passwords from the slave's PC
v)Visit site - This will make the slave PC to visit a site.
vi)Spread - This will start spreading your virus to the slave's USB,IM,WinRAR,etc
vii)Notify - Sound - This will alert you with a sound when connected to the slave's PC

Step 1:Goto "On-join" tab and sort out for which bots you want to use the On-Join feature by

specifying the "ID","WAN","Country","Version".Or use * to execute the task in all bots

Step 2:Select the prefered task from the "Task" drop down list.

Step 3:Click Add to add the fuction.You can add many functions

4)Web Interface:


The web interface is used if you want to control your victims using a phone,OS including and other than Windows whic are

connected by LAN in a web interface.

Step 1:Goto the folder where you have installed Blackshades NET and then /data/web and there open

users.txt and there you can add/remove with admin and guest privileges.eg:admin:bsnet:password.Save the document

Step 2:Goto "Settings" tab and under "Web Interface" Pane type a port and click "Activate" to start

using the Web Interface

Step 3:By clicking Permissions you can adjust the guest permissions on controlling the bot.

Step 4:So now its activated,now you just need any device which needs to be connected with your computer in a LAN network

Step 5:Once your device is connected through LAN,goto web browser and type the LAN IP address of your PC suffixed with a colon then your port number for this.Example: 10.0.0.1:80

Step 6:Once you do that you get a login screen where you can login with your details and control your bots.

5)Market:

The Blackshades Market is a inbuilt market to buy and sell installs/victims/bots safely without the fear of being botkilled

or scammed.

Step 1:Goto "Market" tab and if you want to buy bots click "Continue" in "Buyers" panel and then

click proceed.

Step 2:Enter the direct link to your virus in "URL/Link to your bot"

Step 3:Select the seller from whom you want to buy and click "Next" and proceed after reading the

terms and conditions.

Step 4:If you want to become a seller click "Continue" in "Sellers" panel and set your price per 100

bots and give your contact email id and choose your minimum payout.

Step 5:Click Enroll to become a seller.

--

Ok so after reading this tutorial you should be able to use Blackshades effectively.
This tutorial was completely wriiten by me and I hope this helps many.
Please Rate,Comment,Vote if you like it :D

Thnx for reading the Tutorial.
READMORE
 

[RAT] Cerberus Setup[TUT]


Cerberus 1.03.4 Beta Tutorial


A)

Download Cerberus 1.03.4 Beta.

You can download it here:
http://www.mediafire.com/?mtmzut0lygj

Also, for those who aren't aware of this, if you right-click on a slave's thumbnail in the online server list and click 'Capture Desktop', you can click in that screen and register mouse clicks on their computer. I'm ashamed to admit this, but I only just realized that. :O

B)

Browse to the Cerberus folder, and run Cerberus.exe as shown.
[Image: image1a.png]

C)

The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide you with the option to do all sorts of fun stuff.
[Image: image2rl.png]

D)

Click on the Options button at the lower left corner of the window. This brings up Program Options. You can choose to leave the password as it is, or make a new one.
[Image: image3wa.png]

You have the option to enter 3 ports to listen to. If you don't know how to port forward ports, go search for a tutorial on port forwarding. Once you have your desired ports properly forwarded, enter them (a maximum of 3) into these fields. As you can see, I left the first field default (5150) and then set the second to my preferred port (8245). No, this number doesn't have a whole lot of meaning. Just make sure it is forwarded. Now click Save, and click on Options again. If you just advance to the next radio button, your changes might not be saved.

E)
Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)

In the username box, enter the email address you used to sign up at http://www.no-ip.com. If you don't have an IP registered there, go search for a tutorial on making a no-ip address then come back here once you have your account.
In the password box, enter the password you used at http://www.no-ip.com.
[Image: image4gw.png]

Click Update, Save, then Exit.

F)
Click the New button at the lower left, near the Options button.
This is where you start the creation of your server that you want your victims to click on.

Click the Basic Options button.

[Image: mainu.png]
Where I have entered kaidzaccount.no-ip.biz, you would replace with your own no-ip address that you registered that http://www.no-ip.com.
Click the + button to add it to the Address Book. This is the address your server will try to connect to (destination: YOU). The password must be the same used in Step (E). Connection port must be a properly forwarded port, and one of the possible 3 ports that your Cerberus client will be listening to.

G)

Click the Server Installation radio button.
Set your options as I have. They don't need to be exact, except for the fact that Install Server must be checked.

The directory installation isn't very important, nor are the exact names you choose, but I would suggest you choose any directory besides Temporary Directory.
[Image: image6d.png]

H)

Select the Boot Methods radio button. This is where you will configure how your server is started whenever their PC is restarted.
Set your options as mine (you can change 'WindowsUpdate' to what ever you want) and click the + button after Active Setup a few times.
[Image: image7o.png]

I)

This is where you bind a file of your choice to be run whenever your server is clicked on. If you aren't interested in binding a file to your server, skip this step.

[Image: image8r.png]
Click the ... button after file to select a file to be bound inside your server.

In most circumstances, if the file is something the user actually wants, you would set Execution to Shell Execute (Normal). However, if you don't want any signs of this second added file being visible to the slave, set it to Shell Execute (Hidden). Setting the Destination to anything other than Temporary Directory is preferable. Make sure that a check-box is checked besides each file you want included in the server.

J)

[Image: image9p.png]
Here are some miscellaneous options. I would recommend checking Keylogger Active, so it is easier for you to steal passwords as your slave logs-in to websites.

Check Inject into Default Browser or select Process if you want your server to attempt to hide itself inside a running instance of the user-defined process ( I typed explorer, but if I wanted to inject into the Windows Explorer process I'm pretty sure that I should have typed Explorer.exe instead), and if it fails, it then injects itself into the slave's default browser. Among other things, this aids in preventing your server from being removed by an Anti-Virus program. Nothing is certain though, of course.

The Mutex is any value which uniquely identifies this certain build of your server. If another server with the same Mutex attempts to start, it will cancel because the same server will already be running. You can set the Mutex to whatever you like, or leave it alone.

K)

Under the Create Server page ( you can ignore Display Message, Blacklist, and Overview as they aren't really relevant to this tutorial ), pick a name for your server (which of course you can rename whenever), and select its icon. If the icon you want isn't in the Cerberus\Icons directory, then it won't be available for selection from the Icons List. To select a different icon, click on the icon image itself to load another. Of course, Use icon must be checked.

[Image: image10v.png]

Compact Server with UPX indicates that you want your server to be compressed (in other words, reduced in file size) by the UPX freeware executable compressor. Optional.

Under the File Extension drop down menu, you must select either Application (*.exe) or Screen Saver (*.scr) if you want your selected icon to be displayed.

When you are done, click Create Server.

The following window will pop-up:
[Image: image11pu.png]

A description of what this means is beyond the scope of this tutorial (actually, I'm just too lazy to explain it) so you can go ahead and click No.

Another dialog will inform you that your server was created, and where it is located (usually in the Cerberus folder). You now have your server!

[Image: image13.png]

Now, it is time to test it. One way of doing this is to run it on a spare computer that has access to the internet; in my case, I was was away from home so I didn't have this luxury. I just run the server myself, and if all goes as expected, my Cerberus will play this beast growling sound, and show a little balloon over it's taskbar icon, indicating that you have obtained a connection to a new slave!

L)

You are done. Well, not quite. You need to spread your server in a way that will get potential victims into running it, but that is an entire class of its own in art of computer hacking. There are whole tutorials on that subject.

Once you are done making your server, make sure that you minimize the main Cerberus window so that it is reduced to an icon on the taskbar. This way you can always be listening for connections when a slave runs your server, and you will be notified every so often of the number of currently connected servers in the following manner:


[Image: image14q.png]

That is it! Hope you enjoyed and understood my tutorial. If anyone has something to contribute (corrections, more concise wording, etc.) then please leave a comment.
READMORE
 

[RAT] DarkComet v3.0.1 Setup [TUT]


Hello

This is my first tutorial, it is specially for some newbies out there who dont know what to do.


1)
Create a account at No-IP

2)
Login and do this:






[Image: se47497o.jpg]


3)



[Image: ev5z9cez.jpg]
If you dont know how to get your IP, click here.

4)
Download DarkComet

5)


[Image: 36ef6x3p.jpg]

6)
Press "Edit Server" & "Server Module" and then just do everything I do.

[Image: zu4z3ov7.jpg]

7)

[Image: yujjn7cq.jpg]

8)

[Image: 65cdqbtb.jpg]

9)



[Image: if6uflqj.jpg]

10)

[Image: tqokag8r.jpg]
Press +Listen and add the port you want to listen to, it must be the same port you have added on picture 8, if you dont know how to port forward, just use the search button up there ;)

Now you can start to spread your server, if you are not sure how to do it correct or you just want to know the best way, use the search button.



I hope my tutorial isnt that bad, it was some work and its just for the new users because im pretty sure some of them have some problems to set up the No-IP and the DarkComet Server.

Feel free to post negative/positive feedback and tell me if I should change something :)
READMORE
 

[Tut] Guide to RAT's [All you wanted to know about RAT]

NOTE: This tutorial is written for educational purpouses only! Spreading malicious software may be Illegal in your country/state.


Introduction

What is a RAT?

A Remote Administration Tool (RAT) is a type of virus which allows you to remotely control an infected PC, different RAT's have different functions, common functions include:
-Webcam view (The ability to look through the infected persons webcam)
-Download and execute (Allows you to download and run a program on an infected computer remotely)
-Remote Desktop (Allows you to view the desktop and manipulate the mouse and keyboard of an infected computer)
-Keylogger (Allows you to view everything an infected user has typed, including there usernames and passwords)

Which is the best RAT?
The honest answer is: There is none.

I have used a lot of RATs in my time including blackshades, but my fave RAT is Cerberus which is free.

Please dont post asking "What is the best RAT!?" use your brain and the search feature

How does a RAT work?
A RAT has 2 parts, a server and a client, you use the client to interfere with people on your RAT list, if someone runs your "Server" they will apear on your RAT list. People try to trick others into downloading there RAT server so they can steal passwords and other things.

Is the use of RAT's illegal?
Yes. Infecting someone elses computer is illegal, although hardly anyone ever gets into trouble for RATing. I'v used RAT's for years and never been in any trouble for it, and I'v infected thousands of computers.

Notes:
-A lot of people post "This RAT is apearing as a virus on my anti-virus even though others say its legitimate!" this is because a RAT client creates a server which IS a virus
-Allthough a lot of people test there server on themselves I'd recomend asking a friend to test it for you.
-Please don't call yourself a hacker just because you know how to RAT people...

RAT setup tuts

Dark comet


Cerberus

Blackshades
[RAT]Blackshades NET Complete [Tutorial]
CyberGate
[RAT]How To Setup CyberGate 1.02.0 (THE CORRECT
Port Forwarding

There are so many threads every day asking for someone to port forward for them it's ridiculous, here is how its done:

1. Open your command prompt (Cmd) and type in "Ipconfig" then click enter, scroll up and you should see something saying "Default gateway", next to that it will show your default gateway.

[Image: img1defaultgateway.png]

Note: Your default gateway will begin with either 10, 172 or 192, but it's most likely going to be 192.168.*.* as most networks are class C /24 networks

2. Now type your default gateway into your web browser and you should be presented with a router login screen.

[Image: img2routerloginscreen.png]

Note: Your default login for your router should be on the back of your router, if not try admin as both the username and the password

3. After logging into your router look for the "Port forwarding" or "Advanced options" section, I can't give you precise instructions as there are many different kinds of router

[Image: img3routerportforwardin.png]

4. After following the information on the above picture click "Add" then turn off your router for 30 seconds and turn it back on to reset your router

Spreading

These are the types of spreading I have used over the past few years, they have worked well for me.

E-Whoring
E-Whoring is pretty much pretending to be a female online in chat rooms, post a download link to your server and say that its your "Nude pics" lots of horny 14 year old idiots will download

Fake videos
A fake video is pretty much making a video of a program then uploading the video to youtube, on the download link underneath the video post your download link to your server instead of a download link to the program. It also helps if you ask friends to post on your video saying that its legitimate.

Heres an example of a fake video made by me, not that it has over 100 likes and a lot of comments even though its fake:
http://www.youtube.com/watch?v=IrplF48zg00

Torrenting
Torrenting is by far the best way to spread your server but its hard to get started so alot of people stay away from it, to torrent bind your server with the installation to a game or program and upload it to a torrent site, again getting friends to like and comment on the torrent would be helpful

Java Drive by
A java drive by is a site which you can make to automatically run a program (E.g. your RAT server) on a computer when it visits the site

Other spreading guides:

Crypting

Crypting your server
After creating your RAT server it will be detected as a virus by most anti viruses, this will lose you a LOT of victims, to get around this people use what is called a "Crypter" to make there viruses undetectable to anti-virus software

How does a crypter work?
A crypter works by jumbling code in your server and adding junk code to make the virus undetectable.

Notes:
-FUD means Fully undetectable, a fully undetectable server is undetectable by all anti-viruses
-UD means undetectable, a undetectable server is undetectable by some AV's and detectable by others
-People are unlikely to FUD crypt your server for free as the more users a crypter has the faster it becomes detectable, there are a lot of crypters available for purchase in the marketplace section of hackforums

Thats it for now, I'll continue to add to the guide as I get more suggestions.

Note that this is my first tutorial ever and I'm actually a networking student and a rookie programmer so hacking software isn't realy my speciality, please correct me if I'v made any mistakes.

Please keep this ed and please leave your suggestions if you have any.
READMORE