21/9/2011 --Infiltrating Windows 2000 Server Using Theef (2) ---


----------
This is the next step how to exploiting The Victim's PC with Trojan.
I still use Trojan as my weapon to Infiltrate Victim's PC .....
----------
After we configuring the ‘Duplicate Server’, we move to the next Step, There are send that ‘Dulpicate Server’ to Victim’s PC, so we can accessing remotely and do some ‘Fun’ Things to that computer :D
The Step to controlling Victim’s PC are like the instruction below :



  1. Cause I use the Win 2000 server in virtual box as the Victim’s PC, I only need to copying ‘Duplicate Server’ to the one of shared folder in Win 2000. Then I run it.

  2. From How To Infiltrate with theef
  3. After the ‘Duplicate Server’ has been active, we can start to do some ‘Fun’ Things to Victim’s PC. To control the victim’s pc from our computer we must open Client210.exe program in our computer. Client210.exe is a ‘remote control’ that we will use to control the victim’s PC
  4. After the Client210.exe active, we can connect the Client210.exe to our Victim PC, with filling the victim’s pc IP address to the IP address text box and fill the port of our ‘Duplicate Server’ in the port text box. Then click CONNECT!!

  5. From How To Infiltrate with theef
  6. After the connection has been successfully establish, we can start to controlling the victim PC
There are lot of ‘Fun’ things that we can do to the victim’s computer, the things that I have been try are:
  1. Get the General Info of Victim’s PC

  2. From How To Infiltrate with theef
  3. See the Process that run in Victim’s PC. Actually not only see, but I can kill the process too :D

  4. From How To Infiltrate with theef
  5. Keylogging the keyboard activity of Victim’s PC. With this feature we can know the password or username that has been typed in Victim’s PC.

  6. From How To Infiltrate with theef
  7. Make a Victim’s Monitor Get Blank Screen, and we send a message to that blank screen With Matrix Simulator..Hehe I think it’s one of the best facility that we can use, to make the victim become afraid :D
    From How To Infiltrate with theef
5. Show the files in Victim’s pc and also do some file operations for the file, such as copying,deleting, etc

From How To Infiltrate with theefThere are other facilities of theef Trojan that we can use to infiltrate Victim’s PC, you can try it by yourself, I can’t show all of them in this blog, cause there’re a so lot of facilities, if I explain all of the facilities in this blog, I think it will need a lot of part and it will make me suffer hehehe, so I wo’nt to do it hehehe.
Read more!

21/9/2011 --Infiltrating Windows 2000 Server Using Theef (1) ---

----------

My next step to explore hacking is exploiting The Victim's PC with Trojan.

I use Trojan as my weapon to Infiltrate Victim's PC .....

----------

After I success connecting my laptop to the virtual victim’s pc (win 2000 server in virtual box), I try to attack the victim with a program called Theef. Theef is one of free Trojan Maker Program, that we can use to make Trojan and use the trojan to infiltrate the victim’s pc. FYI, Trojan is one kind of ‘hmm Tools’ that we can use as backdoor to infiltrate someone pc, and do some ‘fun’ things to that pc.

Theef is a GUI based Trojan Maker. We can make a Trojan in a short time, cause Theef is easy to use. But Theef have a weakness, the weakness is that the file of Trojan that Theef created will detected by antivirus as a virus, and it will deleted by the antivirus. So, if we want to use this program to infiltrate someone PC, we must do some ‘Social Engineering’ to make the victim ‘kill’ their Antivirus for a while, when he executing our Trojan in their PC.

So without needed anymore platitude, Here are the step how to use Theef to Infiltrate Someone’s PC, Enjoyed J




  • Create a copy of Server210.exe, and give the copy of that file an ‘Interesting’ name. File Server210.exe is a file that we will use as the Trojan, and that Trojan will make the victim’s PC as a server of our pc.
    From How To Infiltrate with theef
  • Do some configuration for the ‘Duplicate Server’, here are the step to configure:

a. Open Editserver210.exe, and load the ‘DuplicateServer’.

From How To Infiltrate with theef

b. In the top level of Setup menu, we can configure the installation directory of our Trojan. there are 2 installation directory, in Windows Directory or in System Directory. Beside that we can configure the port to access of Trojan, the default port is 6703 for Main Port an 2968 for FTP Port.

From How To Infiltrate with theef

c. In the child level, there’s a menu called Fake Error, in this menu we can create the fake error message, to convinces victim’s that our Trojan is not a virus. The fake Error will appear when the victim;s execute our Trojan. For advice just make a regular error message that will show, if your installation files bad/corrupt.


From How To Infiltrate with theef

d. In another child level of Setup, we can find menu called General. In this menu we can configure the ‘general’ things of our Trojan, such as, the name of our server and the icon.


From How To Infiltrate with theef

e. After we finished configuring the setup menu, we can continuing to configure the password of our server. The password can be used to protect our connection to server, and protecting the configuration of our server.


From How To Infiltrate with theef

f. In the Keylogger menu, we can configure, keylogger facility. Keylogger is a facility that can record all text typed in the victim’s PC. We can set the maximum filesize of keylogger file etc.


From How To Infiltrate with theef

g. For other configuration menu, are additional menu, you want to configure it or not, It depends

  • After you finish configuring the ‘Duplicate Server’ you must save the configuration.
And For the next Step you can read my next article How To Infiltrate Windows 2000 Server Using Theef (2)…

Read more!

20/9/2011 --Hello I'm A Newbie Hacker's--

.....
I start to try hacking an Operating System,
I Used Virtual Box run in Win7 as my Playground, and I used Windows 2000 Server as my Toys
...

My 1st step is connecting my Laptop to the Victim's PC (in this case The Win 2000 Server in Virtual Box). To connecting my laptop to the Victim's PC, I use the Virtual Box facility that called "VirtualBox Host-Only Network". I will used that facility as the network adapter for My Laptop that will connecting My Laptop to the Victim's PC.There're the steps that i used to connecting my laptop to the Victim's PC :
  • Enabling the VirtualBox Host Adapter. (Control Panel-->Network and Internet-->Network Connections)

  • Setting the victim's virtual pc, so the pc can use/access Virtual Box Adapter.



  • Setting VirtualBox Host Adapter's IP address.
  • Run the victim's virtual pc.

  • After the victim's OS was run, setting the victim's PC IP Address
  • After that, try to ping the laptop from victim's PC, using ping command in command prompt (winlogo+r --> write cmd --> run)
  • If the ping gives reply, try to ping from another side (From the laptop)
  • If both of side give reply, it indicate that the laptop has been successfully connected with the victim's PC
  • To ensure that the laptop and pc was connected, we can try to accessing victim's shared folder and try to do some file operation, such as copying a file or deleting a file.

Read more!