Beruflich Dokumente
Kultur Dokumente
a couple of ways that I have found out how to spread my Trojan and
this method can also work for Bots/Rats.
Steps
1. You need a very good crypt with low dependency and 100%FUD.
I would recommend Dark eye crypter or Agis Crypter. Dark eye
crypter can be purchased from dark eye on HF and Aegis crypter
with unique private stub can be purchased from heyHoLetsGo on
BMR. Crypt your Rat/Trojan/bot.
2. After you have crypted your Trojan/bot/Rat, then you need to bind
it with a sexy picture ( you can buy a E-whoring pack, with tons of
female pics of the same person from Fake on BMR)
3. After you have binded the two files it becomes one, now you need
to change the icon of the binded file (so it looks a lot more
convincing) You need to download what is called a icon changer.
There are tons of them that are free and will work.
2. Now click the link icon and get the link. The link is what is
highlighted in the picture.
Now this is a secret am going to share with you about dropbox. The
link that you have is only going to show your potential slaves the
.exe, but it wont download it. So you need to force the link to
automatically download the file when potential slaves visit the link.
To do this we need add a few modifications to the link. The link is
like this now:
https://www.dropbox.com/s/qeluvuxcn4iq546/WebCam.exe, we
have to change it to this:
https://dl.dropboxusercontent.com/s/qeluvuxcn4iq546/WebCam.exe?
dl=1.
So e have our direct download link, so now we post it. Go to
Facebook.com and tagged.com and sign in. Now post something
catchy and add your direct download link(make sure its catchy like:
Please support me modeling by watching me on webcam)
#3 - P2P spreading
Steps
Steps
#4 -Omeagle Spreading
Steps
3. Start the Omeagle spreader by clicking start in the settings tab and
when the pop up says hide browser while working, click yes. This
program is very good because it shows how many people talked to
and how many times your direct download link was spread.
Steps
#5 -Exploit paks
Steps
1. You can rent a exploit pak from HF, the prices are $20 for one day
with a traffic limit of 10,000. You can rent 1 week for $100 with a
traffic limit of 50,000. You can also rent an exploit pak for $300 for
one month. You can buy an exploit pak from the original creators for
$3000 but there website closed registration for English speakers. I
was told that it inst worth it to buy an exploit pack because the
exploits are all java script and you can get the same exploits on
metasploit framework , which is true-- thanks for that Orochi. If you
dont know what exploit paks are then you need to read
this:http://blog.zeltser.com/post/1410922437/what-are-exploit-kits
#5 -Java Silent Drive By
Steps
2. You can have a custom built java drive by from Foxxy Java on
HF( I purchased from them) its $20 for a regular java drive by and
$70 for a silent java drive by, they also provide free hosting and
domains.
Just a comment about the "Silent Java Drive by" - This actually
means exploitation of bugs in various Java versions. You should find
out what is being exploited. Java 6 all revisions had a few good ones
recently, and they won't be patched because Oracle are no longer
supporting it. Under normal operation, Java will always pop the
box.-- by: edc