Hack a Computer by Trojan Virus!
Today we will learn about a Trojan virus which can control victim’s PC and can damage to him/her. ProRat v1.9 is dangerous professional hacking software. You can do many harmful works with this virus. Control PC, breaking security and password, format his/her hard drive, shutdown PC, Restart PC, know about file and folder and much other work you can do with this software.
Yes, this is really true. I will explain what you can do more
with this!
You need to disable your antivirus from your PC before use
it. It is better to off your antivirus totally. Because antivirus will detect
it like a virus and you could not work with this software.
Now you can download ProRat v1.9 software from this link.
Extract the downloaded file and find the main software to
install. You should work carefully with this software because if you work
without knowledge, it will harmful for your own PC. You should work with more
carefully.
You can hack someone’s PC by making a virus with this
software. You need to create a virus with this software and run your created virus
on victim’s PC.
At first start your ProRat v1.9 software.
Click on “create” and select “create prorate server
(342kbayt)”.
You will see a menu like this image below. You are seeing
many fields, all are important.
You need to set your IP in “pro connective notification” because ProRat
software will make a connection by it between you and victim. To set an IP
click on small red button (like a red circle arrow). This software will set
your IP automatically.You must remember incoming IP and you should write it in a note, because
you need this IP in future.
Set your email ID on “mail notification”, by this you will
inform about attacking victim and important information about victim’s PC.
First write your mail ID and click on test button. Check your notification mail.
Is it correctly comes to your mail ID or not? This can be stored to your spam
folder. Save your mail from there. After that all mail will stored to your
inbox by this mail ID.
You need to click small red button (arrow) to fill up “ICQ
pager notification” field. The software will set your ICQ pager notification
automatically.
You need not change anything on “CGI notification”.
So you finished notification part.
Now you need to set general setting. You also are seeing here
many fields.
You need not change in “server port”. Put it unchanged.
Give the “server password” as you like. There are given
123456 by default. You should give a new password so other ProRat user could
not connect to your victim.
Select a victim’s name. You can give any name here as you like.
You will see some tick box in below. Those are command to
your operation on victim’s PC. Set these options as your wish.
Now you finished general setting. The next term is “bind with file”.
You need to bind your Trojan virus with a file. You need to
tick on marking area for this and click on “select file”. You can add any type
of file here.
It is better to use image or small file with your Trojan
virus.
Yes, binding is complete now.
Next term is “server extensions”. Select “server extensions”
and set an extension for your Trojan’s server. In this term it is best to use
.exe extension, because you will get icon support and it will easy to cheat
with a victim.
Next term is “server icon”. Select an icon from “server icon”. You need
to be more careful in this term so you can cheat with a victim easily. Look, I
select there a flower icon.
You finished “server icon” setting.
Now click on the “create server” and a warning message will
come. Press ok on that and your Trojan virus is ready now.
You will see a “server.exe” file in ProRat folder and it is
your created Trojan virus. Do not run this server on your PC by mistake. Because
your PC could be damaged by this server. Rename your server with put a
similarity with icon. You should make this file more attractive so that victim
could not understand this file without antivirus. Then you need to compress
this file. The reason of compressing is generally antivirus program do not scan
compress file. Now you need to upload this file on mediafire or other hosting
site. You must send this file to victim anyway. You can write some special
about it and give a download link of this file. When you will success to send
this file to victim, victim will run this file and the Trojan virus will works
with the command you gave. If your victim has an internet connection then you
can get the full control of his PC. When the victim will injurious, you will
get email notification. What a funny!!
When you get email notification from victim’s PC, click the “connect”.
Before connecting you should write the IP address (notification 1).
Press ok with giving your created virus password. A message
will come like below.
You can take full control of victim’s PC by left side option
of this software. You also can format his hard drive from here.
I am saying again; please do not use this to damage anyone.
You only connected to victim’s PC. Now I am going to tell how
it works! You can get full control of victim’s PC by 24 commands. If I want to
tell all of them I need more time. So I am describing some of them.
Windows:
When you click windows you can see like below. You can refresh and many
other things from here to victim’s PC.
Message:
You can send message to victim by clicking “message” like below.
Chat:
You can chat with victim by clicking “chat”. Look in below.
Keylogger:
You can know more information of victim’s PC by clicking “keylogger”.
Look below.
Give damage:
You can format victim’s hard disk by clicking “give damage”
like below.
It is more. I cannot write all because of short time. Thank you
so much to read it.
Please follow this blog to find more hacking tips.
Do not apply this to damage anyone.
Bye bye!