Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu

Latest Posts

How to create Remote Access Trojan

CYBERGATE

                                 

A Brief Introduction Of Cybergate - CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using Cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the victim’s or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, it’s much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of your office or your homies , that what are they doing at computer. Rather they are sincere or not or etc. THIS IS JUST FOR EDUCATIONAL PURPOSE.

***SO, LET’S START THE TUTORIAL--à

BEFORE CREATING TROJAN, PLEASE TURN OFF YOUR ANTIVIRUS BECAUSE IT DETECT CYBERGATE AS A VIRUS.

Step 1:- Download CyberGatev1.07.5 from download link given below




Step 2:-Open up CyberGate.


Step 3:- Now, Click Control Center.


Step 4:- Then Click on Start Button.



Step 5:- Select Listening ports
Step 6:- Choose the default port, i.e., port no. 81 and add it. Then set up Connection Password and save it.[Allow Firewall  Access]



*** We have done all the settings needed. Now let’s create our Trojan.

Step 7:- Click Control Center and select Builder and click on Create Server.



Step 8:- Click on New and add new user name and click on Forward button.



Step 9:- Now select the default DNS and delete it. Then click on Add button and enter your local ip and port 81 and enter the Connection Password which we have setup while setting up the CyberGate.


Step 10:- Then go to installation tab and click on both of the Random button 5-6 times.


Step 11:- Then go to keylogger tab and we have deselected it but if you want keylogger then you can enter your FTP server details to get all keystrokes of the victim.


Step 12:- Then go to Anti Debug tab and uncheck all.


Step 13:- And finally go to Create Server tab and click on Create Server.



You are done!!! Give Your Trojan file to victim and once he click on that file a remote connection will be setup between you and your victim.

NOTE:- Don’t forget to add the port to your firewall. When Cybergate prompt for your firewall then allow it.




Download for offline Reading:



/* you can also use Easy binder to bind your Trojan with some other setup file.
/* It’s just a beginner’s tutorial of CyberGate and You can do a lot more using this.
/* More Advance tutorial will be coming soon…


For more details, comment below or contact me.
By- Manish Mundra (v0Xv1)


Manish Mundra (v0Xv1) A freaking hacker who spnds most of d tym on net wch makes him a networking specialist.
# Certified Ethical Hacker(CEH)
# Computer Hacking Forensic Investigator(CHFI)
Official website of Manish Mundra
Follow him @ Twitter | LinkedIn | Google+ | Email | Facebook Profile

No comments:

Post a Comment

Master Captain IT Designed by Master Captain It Team. Copyright © 2014

.
Theme images by Bim. Powered by Blogger.