Advertisement
dells

Keylogger, RAT, Stealer, Shell, Phisher

May 24th, 2016
110
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.85 KB | None | 0 0
  1. Okey guys here ill explain for what are this programs and how they work
  2. I dunno if som1 write something like this if then admins delete it :)
  3.  
  4. Ok Let's start
  5.  
  6.  
  7. To help you learn something you must know something about it . Here I will explain the basics .. Include keyloggers, shell's, binder-e,-e crypter. e-stealer, the war-this, e-phisher, brutforce-ve, types of web attacks and protect ... So to begin.
  8. ---------------------------------------------------------------------------
  9. 1) Keylogger - The attacker needs to infect the victim server, so by the victim to run the server, whether it be based on lies, or request an application, it does not matter ... When the victim server starts, it will itself automatically every 5 or 10 or 15 .. minutes to send the e-mail or FTP attacker everything the victim is knocked ... Some keyloggers are more options ... For example, to prohibit the task manager, regedit, run, etc ... For Windows platforms, for protection against keyloggers the best program KeyScambler.
  10. ---------------------------------------------------------------------------------
  11. 2) Shell - Shell is a php file that is used in the attack on the website ... He does not exactly serve to attack, but when uploading to a site through it can see all the files in FTP ... It has the option to self- upload files, change files, it deletes files and many other options. It is also used in the attack on the RFI web sites, and on the attack I will talk a little later. Protection of the shell does not exist for the computer, only for the sites.
  12. --------------------------------------------------------------------------
  13. 3) Binder - Binder programs that serve to combine two files into one. Most often used to bind server from keyloggers, rat-a,-a istealer. Binder contains 2 files. Builder and Pillar. The builder-inserted into the files and bind. Pillar is there done that function. It is not harmful to the computer if it is not a virus binded.
  14. ------------------------------------------------------------------------------
  15. 4) Crypter - Crypter programs that serve to reduce the detection of a server or something else. Also as a binder containing two files. Crypter (the name is arbitrary) and Pillar (often so called). Crypter serves only crpyt file, and as great as the detection of so many steps and will be the detection of the encrypted file when. Crypters are divided into 2 groups. FUD and UD crpyt. FUD (Fully Undetectable) - No anti-virus can not detect encrypted file as a virus, and UD (Undetectable) - Only a few anti-viruses are not detected. It may be that they do not detect an anti-virus, and can be for example 15 ... It is not harmful to the computer if it is not a virus binded.
  16. ------------------------------------------------------------------------------
  17. 5) Stealer - Stealer is a program that serves the victim when it starts to pick up all the saved passwords in computer (the web browser, MSN, Skype, etc ...) ... The most famous is istealer stealer .... Stealer is from a batch file and a php-logger. The first file is the basis of the program in which the real server, the link puts the php logger's (I will explain it after), PHP Logger - usually contains 2 files - index.php and style.css ... Here are the logs of the victims recorded in any other way ... While the real server must be entered from the index.php file link for example ... www.logoviodstealera.com (http://www.logoviodstealera.com) / index.php <--- must be put index.php ... When the victim starts there server logs will be entered ... Php-logger files and be put on a free / paid host ... Databases must be created that could use the php logger, in order to see the logs you'll need to log data to enter in index.php ... Here are the lines that need to be amended to make it work stealer ... This is an example of iStealer 6.0:
  18.  
  19.  
  20.  
  21.  
  22. Code:
  23. $ dbhost = "localhost", / / MySQL host <--- this does not change
  24. $ dbuser = "suicide_admin", / / MySQL username <--- the username created databases
  25. $ dbPass = "GOX", / / MySQL password <--- code from the user's databases
  26. $ dbDatabase = "suicide_is", / / MySQL database name <--- Database Name
  27.  
  28. $ username = "admin" / / Login Username <--- username to view logs
  29. $ password = "GOV", / / Login Password <--- code to view the logs
  30. It is surrounded by computers, only use a good anti-virus, Avir my recommendation ... But if the server can only FUD to be careful not to infect ... My advice is to run all the programs you are unsure of the program called sandboxed ...
  31.  
  32.  
  33.  
  34.  
  35.  
  36.  
  37.  
  38.  
  39. ---------------------------------------------------------------------------
  40. 6) RAT - RAT (Remote Administrator Tolls) ... RAT is the best for me if you want to infect the victim with some server-om (keylogger, stealer, etc.) ... He has the best options ... For example, every war has an option that can run when the victim server that can get into his computer without his knowledge, to open and close the CD Room, the camera turns to the press, and also have some options as a keylogger or a stealer ... Now an important note for WAR ... You control the victim through the program in which you made a server ... Oh now ... Victims are recorded per IP and therefore is used by No-Ip DUC ... At the end of the tutorial put links to some programs and the SS .
  41. ------------------------------------------------------------------------
  42. 7) Phisher - Phisher site is a fake ... For example ... You take in the facebook page save it as index.php and take and write a script that will not record logs So for example you take the cover with a second message type See facebook, just log in to current account and log on when it will in most cases (and depending on options) redirektovace it on facebook.com page and you will be in a file named eg (logs.htm) to enter email and password that the household (eg in this format) email = passwod = .... Phisher can be made ​​for each page that has a login (usually facebook, twitter, skype, msn) ... Always check when you enter data that is not a fake site, ie. phisher
  43. -------------------------------------------------------------------------------
  44. 8) bruteforce - Here is a bruteforce program will explain it with simple example ... Until recently he could to try to hack facebook acc brutforcom but the facebook team introduced that after a certain number of failed logins to seek confirmation captcha ... Facebook for the radio so his way to type in an email from a facebook user you want to hack the program if I am not looking for wordl list with possible codes, that insert themselves and start clicking ... The program will I try to log in to the given email and given the possible codes ... This is a bruteforce .... Not dangerous for PCs but if it does not run, for it has bind a virus ...
  45. ----------------------------------------------------------------------------
  46. This is for tonight Tuxedocrew brothers tommrow ill upload images + download the programs so enjoy the read for now tommrow ill edit it
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement