21/9/2011 --Infiltrating Windows 2000 Server Using Theef (1) ---

----------

My next step to explore hacking is exploiting The Victim's PC with Trojan.

I use Trojan as my weapon to Infiltrate Victim's PC .....

----------

After I success connecting my laptop to the virtual victim’s pc (win 2000 server in virtual box), I try to attack the victim with a program called Theef. Theef is one of free Trojan Maker Program, that we can use to make Trojan and use the trojan to infiltrate the victim’s pc. FYI, Trojan is one kind of ‘hmm Tools’ that we can use as backdoor to infiltrate someone pc, and do some ‘fun’ things to that pc.

Theef is a GUI based Trojan Maker. We can make a Trojan in a short time, cause Theef is easy to use. But Theef have a weakness, the weakness is that the file of Trojan that Theef created will detected by antivirus as a virus, and it will deleted by the antivirus. So, if we want to use this program to infiltrate someone PC, we must do some ‘Social Engineering’ to make the victim ‘kill’ their Antivirus for a while, when he executing our Trojan in their PC.

So without needed anymore platitude, Here are the step how to use Theef to Infiltrate Someone’s PC, Enjoyed J




  • Create a copy of Server210.exe, and give the copy of that file an ‘Interesting’ name. File Server210.exe is a file that we will use as the Trojan, and that Trojan will make the victim’s PC as a server of our pc.
    From How To Infiltrate with theef
  • Do some configuration for the ‘Duplicate Server’, here are the step to configure:

a. Open Editserver210.exe, and load the ‘DuplicateServer’.

From How To Infiltrate with theef

b. In the top level of Setup menu, we can configure the installation directory of our Trojan. there are 2 installation directory, in Windows Directory or in System Directory. Beside that we can configure the port to access of Trojan, the default port is 6703 for Main Port an 2968 for FTP Port.

From How To Infiltrate with theef

c. In the child level, there’s a menu called Fake Error, in this menu we can create the fake error message, to convinces victim’s that our Trojan is not a virus. The fake Error will appear when the victim;s execute our Trojan. For advice just make a regular error message that will show, if your installation files bad/corrupt.


From How To Infiltrate with theef

d. In another child level of Setup, we can find menu called General. In this menu we can configure the ‘general’ things of our Trojan, such as, the name of our server and the icon.


From How To Infiltrate with theef

e. After we finished configuring the setup menu, we can continuing to configure the password of our server. The password can be used to protect our connection to server, and protecting the configuration of our server.


From How To Infiltrate with theef

f. In the Keylogger menu, we can configure, keylogger facility. Keylogger is a facility that can record all text typed in the victim’s PC. We can set the maximum filesize of keylogger file etc.


From How To Infiltrate with theef

g. For other configuration menu, are additional menu, you want to configure it or not, It depends

  • After you finish configuring the ‘Duplicate Server’ you must save the configuration.
And For the next Step you can read my next article How To Infiltrate Windows 2000 Server Using Theef (2)…

0 comments:

Post a Comment