Search This Blog

Thursday, April 19, 2012

How to Hack Email Account Passwords Using ProRat on windows xp

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a textdocument.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easilybypass anti-virus programs.

Facebook Hacking

Ok, here's a new quick tutorial for everyone who has been having to deal with Facebook blocking your entrance into someone's account due to logging infrom a different location.

Ever since I had been problems constantly having to deal with Facebook leaving me out off people's accounts I began to think that I should write over my experiences to help others.

I will go over specific techniques and ideas to eventually grant you entranceto their accounts without having to deal with that Facebook problem havinglogging in from different location.

1. Before you even begin reading this, you must already have theirpasswords or e-mails. If not, I will tell you a few ideas of how to acquire them.

If you only want to log in without changing passwords, I would suggest that you steal their passwords through PhishingKeylogging, or Social Engineering.

2. Bypassing Facebook security can be done through black hat methods, however I will not go over those methods, instead I will be touching the social engineering methods which are more effective and you can get faster results.

3. You will need to use your brain to think and have patience. If you don't have either a brain to think or the patience to wait, please don't continue reading this tutorial because you will not get any success.

Ok, let's move on to the actual information.

-This method is a cheap shot method, but you never know if it might work or not.

1. If a person uses a particular computer to log in to their accounts on a regular basis, THAT computer alone should be your focus.

You should infect that computer with a keylogger and have it linked together with a FTP to send you the logs or linked to send you e-mails.

2. Another method is to use your OWN computer to acquire the password by infecting yourself with a keylogger and let the slave use your computer. Gain their trust to the point of where they can log in to different websites.

You can say for instance "My account is not working, I think Facebook banned me. Can you test your account to see if yours is working?"

And of course, they will log in and you will gain the information. After they successfully log in, you can login to your account and say "Oh, there we go! It worked"

Now, you will attempt to log in in the future and the problem of Logging infrom another location will disappear.

3. Let's say that they aren't stupid enough to use your computer to log in, you might think, what then? Well, here's my next suggestion to you.

Considering that you will already have the password through the methods I mentioned earlier, but you will have the problem of Logging in from another location.

Here's what you do:

Watch and study your slave, if you know he/she uses a location to use a computer, you should attempt to log in at that same location as well. It could be school, library, another friend's house, etc...

Most people will use any computer to log in to Social Networks or E-mails to check on updates. Considering that the IP you log in at that particular is the same within their network, the problem of Logging in from another locationwill not come up.

4. So, you don't have the choice of either offering your computer as a trap or the chance to "stalk" your slave. You wonder, what do I do then?

Well, this is where it gets more tricky considering that Facebook finally came up with an ingenious method to avoid intruders of taking over accounts easily.

Here's what Facebook did, in case if you don't already know. Facebook implemented a feature where you must visually recognize the friends on that account. They will show you pictures of random people within that account and ask you to select the name of that person.


If you don't recognize any of those people, you're screwed.

When will this happen? That will only happen when you attempt to change their passwords, so Facebook makes sure that you do in fact own that account. I personally wouldn't attempt to change the passwords, but if you do try, here's what I would recommend to you.

-If you know the person in person, notice who he/she is friends with to try to recognize the faces and physically ask the other persons their names.

If you do not know the person, you can use websites like:

To search their names, e-mails, phone numbers to see whether if you can find them on other Social networks. You can search the person's name manually by going to Myspace, Facebook, etc...To see who they have added as friends.

Your next step will be to add a friend of the slave or the slave directly. Adding the slave directly would probably be the best plan because you would have access directly to all the victims' friends and their pictures.

Now, all you have to do is match the pictures that Facebook asks you when you attempt to change their passwords by going to the victims friends and match them.

If you don't want to change their passwords, you can mask the slave's IP using other methods in which I will not go over. To find out their IP, you will need a RAT to manually whois them or any other method other there to find their IP.

A quick method I will suggest to you is to send the slave an e-mail if they have a hotmail account. When they reply you can right click on the e-mail and view source. You will see an IP from sender and use that to mask.

Mask their IP and facebook will not give you the problem of Logging in from another location.

If you follow the suggestions I have given you, you will surely gain entrance to their accounts and Facebook won't be able to do crap.

Their security is strong, but good ol' Social engineering never fails.