The Step to controlling Victim’s PC are like the instruction below :
- Cause I use the Win 2000 server in virtual box as the Victim’s PC, I only need to copying ‘Duplicate Server’ to the one of shared folder in Win 2000. Then I run it.
- After the ‘Duplicate Server’ has been active, we can start to do some ‘Fun’ Things to Victim’s PC. To control the victim’s pc from our computer we must open Client210.exe program in our computer. Client210.exe is a ‘remote control’ that we will use to control the victim’s PC
- After the Client210.exe active, we can connect the Client210.exe to our Victim PC, with filling the victim’s pc IP address to the IP address text box and fill the port of our ‘Duplicate Server’ in the port text box. Then click CONNECT!!
- After the connection has been successfully establish, we can start to controlling the victim PC

From How To Infiltrate with theef

From How To Infiltrate with theef
- Get the General Info of Victim’s PC
- See the Process that run in Victim’s PC. Actually not only see, but I can kill the process too :D
- Keylogging the keyboard activity of Victim’s PC. With this feature we can know the password or username that has been typed in Victim’s PC.
- Make a Victim’s Monitor Get Blank Screen, and we send a message to that blank screen With Matrix Simulator..Hehe I think it’s one of the best facility that we can use, to make the victim become afraid :D

From How To Infiltrate with theef

From How To Infiltrate with theef

From How To Infiltrate with theef


From How To Infiltrate with theefThere are other facilities of theef Trojan that we can use to infiltrate Victim’s PC, you can try it by yourself, I can’t show all of them in this blog, cause there’re a so lot of facilities, if I explain all of the facilities in this blog, I think it will need a lot of part and it will make me suffer hehehe, so I wo’nt to do it hehehe. Read more!