paperX: Beginner's guide to coding a hacking tool

Absolute beginner's tutorial / guide to hacking
(Disclaimer: This tutorial is for educational purposes only and is not intended to be put into practise unless you have authorised access to the system you are trying to break into)

Welcome to this beginner hacking tutorial - that's right, for the absolute beginner. If you are looking for a newbies hacking tutorial you've come to the right place.

This tutorial will teach you how to hack into systems using a Trojan Horse. You can download hacking tools used in this tutorial towards the end of this page. This guide is showing how hackers are hacking into home computers every day, and is designed promote awareness and security.


Newbies / Novices / Beginner tutorial on how to hack:

A Trojan Horse is computer program (piece of software) that has two parts to it. A Client part, and a Server part.

The Server:

The Server part is a virus that infects a machine and opens that machine up to being hacked. It is an executable file (.EXE file) and needs to be run just once on a machine that you want to hack into, to infect that machine.

The Client:

The Client part of a Trojan Horse is used to connect to the remote computer running the Server. This is the program that the hacker uses to hack into someone's system and look at their files, download / upload files to that system, open their CD-ROM, play sounds on that system, take screen captures of the hacked system etc. It is an executable file (.EXE).

This is how it works: Someone sends you an email with an attachment (or gives you a disk with the Server on it, or sends you it through IRC etc) called TankGame.exe. You think, ahh, someone has sent me a nice Tank Game. You run it. Kablamo! Your system is now running the Server and is open to be hacked. You won't know this of course, because the TankGame.exe doesn't appear to have done anything, it just disappeared when you ran it, so you think oh well, and carry on surfing the Internet.

The person that sent you the file had just renamed the Server.exe to TankGame.exe. They now use the Client to connect to your computer and hack you.

Each computer on the Internet has a unique computer number. This computer number is called an IP. You need to get the IP of the machine that is infected with this server.

When you have the IP address of a system that is running the Server.exe - or TankGame.exe or whatever you have renamed it to - you use the Client to connect to that IP. When a connection has been established, you use the Client to delete half of their C:\, upload viruses, show pictures of Bin Laden on their screen and open their CD-ROM.

Where do I get this Trojan Horse? Well there are many different Trojan Horses out there. People program them - people who know how to write software in programming languages such as C++, Delphi, Assembler etc. Below are a list of Trojans and links to download them. You should search about on the Internet for specific tutorials on using each individual Trojan, but most of them come with a TXT file with instructions.

They all work in the same way, install the Server on one machine, get the IP, and connect with the Client. The only things that change are the functionality, the look, and any special features a particular Trojan might have.

Trojan Horses: Other names: Hacking toolz / tools, remote administration tools, back doors, backdoors.

Tron
Back Orifice (BO)
Subseven
Netbus

Many of these Trojan Horses (also know as Backdoors, remote administration tools, or hacking tools) with the exception of Tron because it is still fairly new, are detected by virus software. If you tried sending someone these, their virus software (that comes with the majority of new computers these days) will probably detect them.

The only real way to ensure virus software doesn't detect a Trojan Horse would be to program your own. This would mean learning a program language, buying book after book of programming guides, taking a class, or trying to piece together what you can find in free guides on the Internet. Luckily however, one company has put this information into one sought after paper: paperX at a cost of £15.00 ($21.87).

I purchased a copy a few months ago, and it taught me how program a Trojan Horse. I use the hacking tool I've coded to control the other computer on my home network.

Programming your own also means virus software won't detect it because they haven't been programmed to detect it. The website for paperX is: http://www.xpaperx.com. Read about it first on their site before you buy, but if you are interested in becoming a better hacker, it is the way to go - because real hackers don't just use Trojan Horses, they create them.




Visit this link for other hacking sites:

Click here to Vote!





Or home shopping sites: BuyGiftsOnlineUK.co.uk
or: ShoppingOnline-UK.co.uk Video downloads related