everything we need Forum Index everything we need
if you need anything just stay with us
 
 my stesha 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

E-MAIL ACCOUNT HACK - USING ProRAT TO HACK ANY E-MAIL ACCOUN

 
Post new topic   Reply to topic    everything we need Forum Index -> Hacking Tutorials & Lessons
View previous topic :: View next topic  
Author Message
stephin
Site Admin


Joined: 20 May 2011
Posts: 73

PostPosted: Fri Jul 29, 2011 3:42 pm    Post subject: E-MAIL ACCOUNT HACK - USING ProRAT TO HACK ANY E-MAIL ACCOUN Reply with quote

PRO RAT TUTORIAL - E-MAIL ACCOUNTS HACKING
********************************************************************************​****************************************************************
USING PRO RAT TO GAIN ACCESS TO ANY EMAIL ACCOUNT - STEP BY STEP GUIDE
********************************************************************************​


OK Guy's..So here we are starting with a Detailed Tutorial on How to use a Popular program ProRAT to Hack any E-Mail Account.Will add more Tutorials on how to use ProRAT for various hacking Exploits!!But starting of with the all time favorite "E-MAIL HACKING"..
* STEP.1: DOWNLOAD PRORAT :

Code:
http://www.prorat.net/downloads.php
PASSWORD : "pro
"

STEP.2: USER INTERFACE OF PRORAT :




* STEP.3: CREATING A PRORAT TROJEN SERVER :

Inorder to create the ProRat Trojan server, Click on the "Create" button at the bottom and Choose "Create ProRat Server" option as shown below :

STEP.4: CONFIGURING SERVER SETTINGS :

To Configure enter your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message.



STEP.5: CONFIGURING GENERAL SETTINGS :

Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.



STEP.6: BINDING A FILE WITH TROJEN :

Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.



STEP.7: CREATING THE SERVER FILE :

Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.



STEP.8: CHOOSING A ICON FOR THE SERVER FILE :

Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.



STEP.9: RENAME "binded_server" :

After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.




STEP.10: SENDING THE TROJEN :

You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.



STEP.11: CONTROL OF THE VICTIMS P.C :

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. you would then get a message telling you that the victim was infected. you Could then connect to his computer by typing in his IP address, port and clicking Connect. you May be asked for the password that he made when he created the server. Once you type it in, you will be connected to the victims computer and have full control over it.



STEP.12: CONGRATS BRO.YOU NOW POSSES FULL CONTROL OF THE VICTIMS P.C AND CHECK OUT THESE COOL OPTIONS AVAILABLE TO YOU :

You now posses full control and a lot of options are available to you to choose from as you can see below. you gain full access to all victim's computer files, you can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more.

Back to top
View user's profile Send private message Send e-mail
Display posts from previous:   
Post new topic   Reply to topic    everything we need Forum Index -> Hacking Tutorials & Lessons All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group

Hosted by ForumCity