Sunday, August 11, 2013

Pro Rat Tutorial - Remote Administration Tool



Hi guys..today i am going to show you how to set up ProRat and how to hack a computer using it. 


Procedure to setup ProRat


  STEP 1. 
=======

First of all Download ProRat from here. Once it is downloaded extract it. A password prompt will come up. Enter the password.The password  "pro".

STEP 2. 
======

Open up the program and You should see the following window.


STEP 3. 
======

Click on the "Create" button in the bottom. Choose "Create ProRat Server".



STEP 4. 
======

Next put your IP address so the server could connect to you. You need not enter your IP address manually, you can do this by just clicking on the little arrow. it automatically fills your IP address.
Next put in your e-mail so that when and if a victim gets infected it will send you an email. 


STEP 5.
======

 Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager. Just follow the steps as shown in the figure.


STEP  6.
=======

 Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. You can select an image, text file or pdf file, So as to make the victim trust your file.


STEP  7. 
=======

Click on the Server Extensions button to continue. Here you choose what kind of server file to generate.    I prefer using .exe files.



STEP  8. 
=======

Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is.




STEP  9. 
=======

After this, press Create server, your server will be in the same folder as ProRat. Start giving this file to your victim. When the victim double click the file, his computer will be in your control.




STEP  10. 
========

Now the hacker has lot of options to choose from. He can do many funny things with the victim’s computer.




++++++
NOTE: 
++++++

In this tutorial, i put the victim’s IP as 127.0.0.1 as i am testing it on my computer. Inorder to hack a remote computer, you need to get the IP address of your victim.






0 comments:

Post a Comment