_____ | \ | |\ \ | ___| |__/ | \___ | | TTTTT TTTTT |\ | | | TTTTT | | | | T T | \ | | | T | |/ / | | T T | \ | | | T |_____/ |____| T T | \| |____| T _______________________________________________________ Guide To Trojan Success October, 1999 By |~BuTtNuT~| http://hackercentral.securedonline.com buttnut10@hotmail.com ICQ-29062316 In this text, I will be explaining the best way (in my opinion) to successfully execute a trojan upon a victim. This is for newbies and even intermediate "hackers" alike. Please remember that just because you may be able to access someone's system through a trojan does not make you a true hacker. Now we must go onto the disclaimer bullshit. *@*@*@*@--BEWARE--@*@*@*@* Please note that the things explained in this text are for educational use only. What you may or may not do with the following information is up to you which means that you are the only person responsible. The people, websites, and affiliates mentioned are NOT responsible. No modifications of this text may be made without the author's permission, and if he does find out otherwise, the modifier will be fucked. Thank You. *@*@*@*@----------@*@*@*@* Okay, now that we are past all that, lets begin. First of all, ICQ is the best way to be successful. Get ICQ if you don't have it (www.icq.com) Second, you will need to have a trojan. There are many available on my site which is listed above. I also recommend http://www.warind.com for some others you may want to experiment with. Recently, The War Industries has closed. You may want to check my site or even search. My favorite current trojan to use is SubSeven v1.9 by MobMan. He comes out with newer versions often, but currently, this is my favorite. You may find that you like other options. The point of a trojan is to secretly install a server on a victim's computer so you can access it from yours. This is probably the hardest part of the whole process. Next I will explain a few ways you may want to go about getting this done. METHOD 1 Once you have your trojan, go to webcrawler or yahoo and search for "free games". Find a game that is really small and not too popular. (For example, "Chickens 2"). Download the game and save it to the same directory that you trojan is in. Next, find an EXE Joiner somewhere. (Again, my site or warind.com). Use the EXE Joiner to join together the trojan server and the small game. Find your victim and sweet talk him/her into wanting this game. Send it to them via ICQ File Sender. When they open it, the trojan server will be installed without their knowledge. Now all you need is their IP number to enter into the trojan. You can ususally get this by getting their info on ICQ. Once you are in, be careful. It will look suspicious if wierd things start happening after they get this game from you. Have fun. METHOD 2 If this way doesn't appeal to you, try this. It is a little simpler. All you have to do is rename the server file. (For Example: 'Chickens 2'). On ICQ, go to 'Find A Random Chat Partner', and find one. Now when you find your victim, sweet talk them into trying out a new Beta Version of a game or program. For example: "Hello. My name is John Ockleshaw and I have randomly selected you to try out the new Beta Test Version of the game "Chickens 2"....Would you like to try it out for free and to keep?" This may not be exactly what you may want to say, but this is probably the most important part of this method. Think up something good. Now when the first 15 people say no, don't get discouraged. Many people are way too busy to mess with a little game. You may want to search under the subtopic 'Games'. When you have found someone that wants it, keep talking to them and then send it to them. When they get it and open it, get their IP number and go from there. METHOD 3 Another way which has never worked for me is to find a Picture Joiner (www.warind.com). This joins a picture and a server file together. Chat with someone and ask if they want your picture. Send the picture to them and the server will install when they open the picture. Again, this seems like a good way, but it has never worked for me. This may be an option in a newer version of SubSeven. HELPFUL TIPS Some trojans let you configure the server file. I know that Subseven v1.9 does. Some included options are: notification by ICQ or e-mail when the user is on, EXE Joining, fake error messages when opened, and server passwords so only you can access it on their system and no other hacker. All of these are great and they can help when you get a little more experienced. Well, that is all for now. I hope this has been helpful. E-mail me or ICQ me with any NECESSARY questions, if any. If you feel that there are other good ways that you like, let me know and I will include them in the next version. Thanx. |~BuTtNuT~| (New Site Coming Soon) buttnut10@hotmail.com ICQ- 29062316 October, 1999