CYBERGATE
A Brief
Introduction Of Cybergate - CyberGate is a powerful,
fully configurable and stable Remote Administration Tool coded in Delphi that
is continuously getting developed. Using Cybergate you can log the victim's
passwords and can also get the screen shots of his computer's screen. You can
connect o multiple victims in single time. One should no know what is the
ip-address of the victims' computers. That is the main benefit. What you have to
do is to spread the server file to the victim’s or the people whom you want to
infect. Also there is a file manager utility using which you can explore the
data of the victim. So, it’s much exciting, therefore i thought to give a
tutorial about it, since it can also be used for constructive purpose i-e you
can view the clients of your office or your homies , that what are they doing
at computer. Rather they are sincere or not or etc. THIS IS JUST FOR
EDUCATIONAL PURPOSE.
***SO, LET’S START THE TUTORIAL--à
BEFORE
CREATING TROJAN, PLEASE TURN OFF YOUR ANTIVIRUS BECAUSE IT DETECT CYBERGATE AS
A VIRUS.
Step 1:- Download CyberGatev1.07.5
from download link given below
Step 2:-Open up CyberGate.
Step 3:- Now, Click Control
Center.
Step 4:- Then Click on Start
Button.
Step 5:- Select Listening
ports
Step 6:- Choose the default port, i.e., port no. 81
and add it. Then set up Connection Password and save it.[Allow Firewall Access]
*** We have done all the settings needed. Now let’s create
our Trojan.
Step 7:- Click Control
Center and select Builder and
click on Create Server.
Step 8:- Click on New
and add new user name and click on Forward
button.
Step 9:- Now select the default DNS and delete it. Then
click on Add button and enter your
local ip and port 81 and enter the Connection
Password which we have setup while setting up the CyberGate.
Step 10:- Then go to installation
tab and click on both of the Random
button 5-6 times.
Step 11:- Then go to keylogger
tab and we have deselected it but if you want keylogger then you can enter your
FTP server details to get all keystrokes of the victim.
Step 12:- Then go to Anti
Debug tab and uncheck all.
Step
13:- And finally go to Create Server
tab and click on Create Server.
You are done!!! Give Your Trojan file to victim and once he
click on that file a remote connection will be setup between you and your
victim.
NOTE:-
Don’t forget to add the port to your firewall. When Cybergate prompt for your
firewall then allow it.
/* you can also use Easy binder to bind your Trojan with
some other setup file.
/* It’s just a beginner’s tutorial of CyberGate and You can
do a lot more using this.
/* More Advance tutorial will be coming soon…
For more details, comment below or contact me.
By- Manish Mundra (v0Xv1)
Manish Mundra (v0Xv1) A
freaking hacker who spnds most of d tym on net wch makes him a networking
specialist.
# Certified Ethical Hacker(CEH)
# Computer Hacking Forensic Investigator(CHFI)
No comments:
Post a Comment