Monday, 4 June 2012

HACK BACKTRACK 5 via RAT


HACK BACKTRACK 5 via RAT
BackDoor Rat Poisioning 

Introduction
  1. Firstly , we Download Prorat .
  2. We Create a Bind Server .
  3. Examples : How to hack Backtrack 5
  4. Examples :  Windows to Windows hacking 

Download ProRat 
  1. Before doing Experiment with Backtrack 5 , first you need to install Prorat V1.9 on your windows Xp Machine .  
  2. Download : http://www.prorat.net/downloads.php?id=ProRat_v1.9_Fix2(ZipPass:pro)
  3. Password of this Zip file is : pro
  4. After download extract the Prorat and Run it . 
Creating Server 
  • Click on the create button and then on the Create ProRat Server button.
  • See the below image for more details - 

  • Enter the  IP in the ProConnective  Notification
  • If you don’t know the IP address click the red arrow and It will fill  IP address automatically.
  • Mail Notification : In this option , you have to enter your email address , so whenever the server is installed into your victim computer ,it will send a notification in your mail id .
  • See the below image for more details -



GENERAL SETTINGS TAB
  • Here you can do some settings .
  • See the below image for details -


  • In General Settings , you can also configure a fake message .
  • See the below image -


BINDING FILE 
  • Click on ' Bind with file ' on the sidebar. 
  • You can bind it with a text document or Image File.
  • See the below image for more details - 



SERVER EXTENSION 
  • From here you can Select the Server Extension.
  • Se the below image for the extensions -

SERVER ICON 
  • Now Click on server Icon and choose the  icon and click on Create server.




CLICK ON CREATE SERVER 
  • Now, when all things are done, hit on “Create server” and you will get server created in Prorat directory. 
  • This server is used for remote pc access.




  • Now, when you have created PRORAT server, next step is to send this server to victim computer and then use PRORAT for remote pc access.



  • Now, when you have created PRORAT server, next step is to send this server to victim computer and then use PRORAT for remote pc access.



Connecting To Backtrack 5 
  • Enter the ip address of victim machine and click on the connect button.
  • See the below image for more details -




EXAMPLE 1 : PC INFORMATION 
  • Here you can see the PC info of Backtrack 5 .
  • See the below image for details -




EXAMPLE 2: Flip the Backtrack Screen 
  • From ProRat , you can also flip the Backtrack 5 Screen .
  • See the below image for more details - 




EXAMPLE 3: SENDING MESSAGE 
  • Sending Message to Backtrack 5 .
  • See the below image for details - 

Victim (Backtrack 5 ) Machine 


EXAMPLE 4: SCREENSHOT 
  • Through Prorat , you can take a screen shot of a Victim( Backtrack 5) PC.
  • See the below image for more details - 


EXAMPLE 5: CHAT WITH VICTIM (BACKTRACK) MACHINE 
  • In this example , hacker (hackingDNA) is chatting with Victim ( Backtrack 5 ) Machine.
  • See the below image for more details - 


Windows to Windows Hacking with ProRat 
These all images from here are a year old examples but it help you to understand what you can do with ProRat in Windows .

  • Example 1 : Cross Chatting between Victim & Hacker.

Example 2: Run cmd on Remote Machine 
  • Through ProRat , running command prompt on Remote Machine or Victim Machine .
  • See the below image - 


Example 3: Open Control Panel on Victim Machine
  • See the below image for details -


Example 4 : Flip the Victim Screen 
  • See the below image - 


Example 5 : Accessing Victim C Drive via ftp 
  • See the below image for more details -

Example 6 : Hide the Start buton 
  • See the below image for more details -

Example 7 : Keylogger
  • Hack the victim keystrokes using keylogger.
  • See the below image for more details - 


Example 8 : Matrix Chat 
  • Chat Session between hacker and Victim in a Matrix Style .
  • See the below image for more details -

Example 9 : Message Sending 
  • Send any message to Victim PC.


Example 10 : Open Paint On Victim Machine , if he is using Windowx XP
  • See the below image - 


Example 11 : Registry Editor
  • Victim Registory Editing Service on Hackers Machine .
  • See the below image for more details -

Example 12 : Remote Desktop 
  • With ProRat, hacker takes Victim Machine on Remote .
  • See the below image -

This is how after setting a backdoor on your system , a hacker can easily 
  1. Take your PC on a Remote 
  2. He can grab your Keystrokes through a Keylogger .
  3. He can take a screenshot of a Victim Screen .
  4. He can also take a picture from a Victim  Web Cam .
  5. He can access your directories , Registry , command shell , registry editor , control panel etc.
  6. This all we can done with single IP and setting a Trojan on Victim Machine.
Security Measures 
  1. Its Important you should have a Firewall installed on your system .
  2. Update AntiVirus Regularly . 
  3. Use Update Antiviruses  , it protect you from these  trojan , viruses and even what we created a Bindserver trojan . It can detect and deleted all the viruses 
  4. An update antivirus help you to safe from these Trojans and Viruses  . 

  • I am expecting , this tutorial help you  a lot to understand lots of things  . 
  • It a good Tool for practising and learning .
  • Use this tool for learning purpose only . 
The Reason why we can do some  Activities or create a backdoor with Backtrack 5 is Wine , which can run exe file on Backtrack .

I hope you like this tutorial , if you want to say something , drop a message here or you can visit our facebook page .

Join Us 
On
facebook

THIS ARTICLE IS JUST FOR EDUCATIONAL PURPOSE ONLY/- 

4 comments:

Anonymous said...

can we do it with VMware becoz i dont have 2 PC i have one PC i installed in VM xp and BT my main os is win7 can i do it just for learning purpose...

HackingDNA.com said...

Yes you can do it , but remember take to make 2 virtual machine , if you directly run a binded server.exe on your windows 7 , it will create some problems.

Thanks for your interest in this article . Keep following www.hackingdna.com

HackingDNA.com said...

If you are a new guy in this area then its better to work with virtual machines . because trojan can damage your main windows system .

I am saying this because i have faces problems earlier when i am experimenting with it .
So keep learning and keep following www.hackingdna.com

Khan said...

i am very impressed with your work !!! thanx ..... it saved my academic year !! i am very thankful to you ....

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts