HACK COMPUTER WITH TROJAN HORSE [ CREATE BACKDOOR ]
- Deleting data
- Blocking data
- Modifying data
- Copying data
- Disrupting the performance of computers or computer networks
Backdoor
A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching, and deleting files, displaying data, and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
===============================================
Now today we will learn how to create trojan horse. and how to use it. with this you can gain the access of any computer infected by trojan. now we will use the tool named "dark comet rat" for creating trojan
DOWNLOAD DARK COMET RAT
=======================================================================
1st we will learn to hack pc situated in lan after that we will learn "dynamic dns" configuration and then ...we will hack pc over internet......................
then let's start
step 1:
1st of all you need to know your local ip address
you can see this by following
- press window+r
- wire "cmd" press enter
- now type "ipconfig"
step 2: - " disable your antivirus "
and follow the step
Comments
Post a Comment