21/9/2011 --Infiltrating Windows 2000 Server Using Theef (2) ---


----------
This is the next step how to exploiting The Victim's PC with Trojan.
I still use Trojan as my weapon to Infiltrate Victim's PC .....
----------
After we configuring the ‘Duplicate Server’, we move to the next Step, There are send that ‘Dulpicate Server’ to Victim’s PC, so we can accessing remotely and do some ‘Fun’ Things to that computer :D
The Step to controlling Victim’s PC are like the instruction below :



  1. Cause I use the Win 2000 server in virtual box as the Victim’s PC, I only need to copying ‘Duplicate Server’ to the one of shared folder in Win 2000. Then I run it.

  2. From How To Infiltrate with theef
  3. After the ‘Duplicate Server’ has been active, we can start to do some ‘Fun’ Things to Victim’s PC. To control the victim’s pc from our computer we must open Client210.exe program in our computer. Client210.exe is a ‘remote control’ that we will use to control the victim’s PC
  4. After the Client210.exe active, we can connect the Client210.exe to our Victim PC, with filling the victim’s pc IP address to the IP address text box and fill the port of our ‘Duplicate Server’ in the port text box. Then click CONNECT!!

  5. From How To Infiltrate with theef
  6. After the connection has been successfully establish, we can start to controlling the victim PC
There are lot of ‘Fun’ things that we can do to the victim’s computer, the things that I have been try are:
  1. Get the General Info of Victim’s PC

  2. From How To Infiltrate with theef
  3. See the Process that run in Victim’s PC. Actually not only see, but I can kill the process too :D

  4. From How To Infiltrate with theef
  5. Keylogging the keyboard activity of Victim’s PC. With this feature we can know the password or username that has been typed in Victim’s PC.

  6. From How To Infiltrate with theef
  7. Make a Victim’s Monitor Get Blank Screen, and we send a message to that blank screen With Matrix Simulator..Hehe I think it’s one of the best facility that we can use, to make the victim become afraid :D
    From How To Infiltrate with theef
5. Show the files in Victim’s pc and also do some file operations for the file, such as copying,deleting, etc

From How To Infiltrate with theefThere are other facilities of theef Trojan that we can use to infiltrate Victim’s PC, you can try it by yourself, I can’t show all of them in this blog, cause there’re a so lot of facilities, if I explain all of the facilities in this blog, I think it will need a lot of part and it will make me suffer hehehe, so I wo’nt to do it hehehe.

0 comments:

Post a Comment