Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 39
  1. #16
    Zhellbound's Avatar
    Join Date
    Aug 2008
    Gender
    male
    Location
    In Your Mind
    Posts
    5,192
    Reputation
    21
    Thanks
    447
    My Mood
    Happy
    Quote Originally Posted by dk173 View Post
    my friend had a program u type a ip and the program does the rest he said it sends a shit load of virus to u
    All talk, no action.
    Deutschland wird wieder Reign!

    Ganja King
    Thank me if i helped

  2. #17
    Inna's Avatar
    Join Date
    Jun 2007
    Gender
    male
    Posts
    11,161
    Reputation
    61
    Thanks
    270
    My Mood
    Tired
    Seriously I need that kid taken down -.-'.

  3. #18
    M2A's Avatar
    Join Date
    Feb 2007
    Gender
    male
    Location
    HELL BITCH!
    Posts
    3,209
    Reputation
    112
    Thanks
    121
    My Mood
    Fine
    well i know how to shutdown his computer i can do that 100000000 of times

  4. #19
    Inna's Avatar
    Join Date
    Jun 2007
    Gender
    male
    Posts
    11,161
    Reputation
    61
    Thanks
    270
    My Mood
    Tired
    Than do it by all means =/.

  5. #20
    LegendaryAbbo's Avatar
    Join Date
    Dec 2008
    Gender
    male
    Posts
    5,244
    Reputation
    23
    Thanks
    546
    My Mood
    Relaxed
    Quote Originally Posted by master2all View Post
    well i know how to shutdown his computer i can do that 100000000 of times
    I dont think he will turn it back on 100000000 times :P

  6. #21
    mac_man's Avatar
    Join Date
    Dec 2008
    Gender
    male
    Posts
    275
    Reputation
    10
    Thanks
    65
    IP address: 74.51.108.44
    IP country: United States
    IP Address state: Georgia
    IP Address city: Trenton
    IP postcode: 30752
    IP latitude: 34.8967
    IP longitude: -85.5206
    ISP: API Digital Communications Group
    Organization: API Digital Communications Group
    Host: dynamic-74-51-108-44.tvn.net

    that all i got probaly nothing new

    i have a friend that might know about this maybe i can ask him
    Last edited by mac_man; 06-11-2009 at 02:12 PM.

  7. #22
    Inna's Avatar
    Join Date
    Jun 2007
    Gender
    male
    Posts
    11,161
    Reputation
    61
    Thanks
    270
    My Mood
    Tired
    That's already posted =S. Ask your friend please, the guy is a fucking bitch that can't do shit and needs to be owned.

  8. #23
    mac_man's Avatar
    Join Date
    Dec 2008
    Gender
    male
    Posts
    275
    Reputation
    10
    Thanks
    65
    ok i'll ask him

  9. #24
    M2A's Avatar
    Join Date
    Feb 2007
    Gender
    male
    Location
    HELL BITCH!
    Posts
    3,209
    Reputation
    112
    Thanks
    121
    My Mood
    Fine
    >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>
    >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>
    >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>
    lll lll
    lll THE BEGINERS GUIDE TO TROJAN HACKING lll
    lll VOLUME 1 - NETBUS lll
    lll lll
    lll BY WEAPON N lll
    lll lll
    lll 01/01/00 lll
    lll lll
    <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< <<<<<<<<<<<<<<<<<<<
    <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< <<<<<<<<<<<<<<<<<<<
    <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< <<<<<<<<<<<<<<<<<<<

    **Feel free to distribute this text however you would like, all I ask
    is that you don't modify it in any way. If you would like to give
    me a yell then by all means come and find me**************

    ****I am not responsible for anything stupid you may end up doing****

    1. Introduction

    2. FAQ;s

    3. What You Need

    4. How To

    5. Protection

    6. Why To Do It

    7. Hacker Ethics/Code

    __________________________________________________ ___________________

    1. Introduction

    Welcome to the wonderful world of trojan hacking, for those of you who
    don't know what trojan hacking is, trojan hacking is simply the use of
    a program to gain access to another persons computer. Hence this is
    not true hacking. True hacking involves massive codes, passwords, and
    something most good hackers like to call UNIX, yes for almost a year
    and a half I was a Trojan hacker, but now I'm a good 2 years into
    studying and understanding UNIX. This Volume which, yes, was written on
    the first day of the year 2000, involves the use of the program Netbus.
    Which is probably the most commonnly used trojan of our day. This was
    geared to be a guide with which you could easily take netbus and a few
    other resources, and get into other persons computers.

    2. FAQ's

    1 - To get into anothers computer, both computers must be turned on, and
    online
    2 - Yes this program does sometimes screw up, just turn it off and back
    on again
    3 - Unless you have actually paid for the Trojan, you do have an Illegal
    compy
    4 - There must be a remote program installed on the other persons comp
    before you will be able to connect to it
    5 - If you actually read all of this, you either a newbie, or an idiot

    3. What You Need

    Well first you need the trojan of the day, Netbus, and yes you could
    type that word in on almost any search engine, and viola you have
    hundreds of answers to your query, I will also provide you with a good
    download spot which is on one of my friends domains, so that it probably
    won't be removed for a few years. You'll also need an IP sniffer which
    I will tell you more about later.

    Downloads:

    https://www.starwarshq.com/netbus17.zip
    https://www.starwarshq.com/sniffer.zip

    ***If those don't work try changing the files to all caps, or just the
    extensions as caps, if neither work they aren't there no more, so just
    go to altavista or something***

    4 - How To

    How to? How to what hack, yeah thats it. Netbus once you click on
    Netubus.exe up pops this little window with all kinds of buttons, read
    them if you want, now the part were gonna concentrate on is the place
    where it says 'Host name/IP', well this is where everything comes down,
    this is where you type in the person (or computers) IP number you wish
    to get into. But then your sitting there thinking, wait a minute I don't
    know what my friends IP is, well thats where the Sniffer program I told
    you about earlier comes into play at.

    ICQ you know what it is 60% of the people who are online have ICQ, if
    you want to hack your friends, you'll need this, ICQ serves two purposes
    one it tells you whether or not your friends are online, and two it
    gives the all useful thing called a UIN number, which is there user
    number on ICQ, you can find it after clicking on there name, and finding
    out all of there information (and yes sometimes, under there information
    you will see there IP address), but most of the time you won't see there
    IP address, so put there UIN number into the ICQ IP Sniffer which you
    should have downloaded by now. And again viola you have there IP.

    Now you see that second thing that says 'Port', well for the most part
    thats just there to be annoyying, but sometimes it comes in handy, but
    I'll talk about that in a latter volume. So you have the IP, and your
    ready to hit the 'Connect' button. Well no your not, you know when you
    downloaded that Nebus17.zip, well theres a program called Patch.exe,
    well do you, that program has to have been run on the other persons
    computer, yep it has to have been run on ther comp, physically executed
    by the other guy. Now there are a lot of ways to do this, just think
    about them, you could actually be there friend, and be over there house
    enough that you could sneakily do it, or when giving them a program tell
    them to run it as an update or something (You can rename it to anything
    you want you know).

    Once the program is on there computer, you've got there IP, you hit the
    connect button, and again viola you are now inside that persons computer
    wow, you just got into somebody's computer. I'm not gonna bother
    explaining what all of those buttons do, they are pretty much self
    explanatory after this point.

    5 - Protection

    You may want to take this to heart yourself, there is a program out there
    called Netbuster, which detects the Patch.exe after its been ran, and
    gets rid of it, which leaves you powerless to gain access again. There
    are other programs that will password protect machines against trojans
    as well. When this happens, most of the time the Trojan Hacker is useless
    and this is where the true hacker takes over in the quest for information.

    6-7- Why to do it, and Ethics

    Well here's the end, you may get into other peoples computers just to
    freak them out by opening there Cd rom tray dozens of times. But you
    take it past the point of hacking, and of morals when you begin to do
    damage to there computer.

    1. Don't alter or delete any files, other than those to protect yourself
    2. DO NOT hack government computers
    3. Yes you can be traced if your not careful, so please take head

    The Hacker Manifesto

    This is our world now... the world of the electron and the switch,
    the beauty of the baud. We make use of a service already
    existing without paying for what could be dirt-cheap if it wasn't
    run by profiteering gluttons, and you call us criminals. We
    explore... and you call us criminals. We seek after knowledge...
    and you call us criminals. We exist without skin color, without
    nationality, without religious bias... and you call us criminals.
    You build atomic bombs, you wage wars, you murder, cheat, and
    lie to us and try to make us believe it's for our own good, yet
    we're the criminals.

    Yes, I am a criminal. My crime is that of curiosity. My crime is
    that of judging people by what they say and think, not what they
    look like. My crime is that of outsmarting you, something that
    you will never forgive me for.

    I am a hacker, and this is my manifesto. You may stop this
    individual, but you can't stop us all... after all, we're all alike.


    ---Mentors Hacker Manifesto

    ***Look for more tutorials to come




    THIS ISNT MINE!!!

  10. #25
    M2A's Avatar
    Join Date
    Feb 2007
    Gender
    male
    Location
    HELL BITCH!
    Posts
    3,209
    Reputation
    112
    Thanks
    121
    My Mood
    Fine
    /////////////////////////////////////////////////////////////////////
    /////////////////////////////////////////////////////////////////////
    /////////////////////////////////////////////////////////////////////
    \\\ \\\
    \\\ THE BEGINERS GUIDE TO TROJAN HACKING \\\
    \\\ VOLUME 2 - Back Orifice 2K \\\
    \\\ \\\
    \\\ BY WEAPON N \\\
    \\\ \\\
    \\\ 01/17/00 \\\
    \\\ \\\
    /////////////////////////////////////////////////////////////////////
    /////////////////////////////////////////////////////////////////////
    /////////////////////////////////////////////////////////////////////

    **Feel free to distribute this text however you would like, all I ask
    is that you don't modify it in any way. If you would like to give
    me a yell then by all means come and find me**************

    ****I am not responsible for anything stupid you may end up doing****

    1. Introduction

    2. FAQ;s

    3. What You Need

    4. How To

    5. Protection

    6. Why To Do It

    7. Hacker Ethics/Code


    ****Please take note, volume 2 will probably be updated within the
    next month, so please come and check back. This is due to the
    changing of Sniffers, ICQ's AOL stuff and such, so we'll give you
    more up to date information if we need too****


    __________________________________________________ ___________________

    1. Introduction

    Welcome to the wonderful world of trojan hacking, for those of you who
    don't know what trojan hacking is, trojan hacking is simply the use of
    a program to gain access to another persons computer. Hence this is
    not true hacking. True hacking involves massive codes, passwords, and
    something most good hackers like to call UNIX, yes for almost a year
    and a half I was a Trojan hacker, but now I'm a good 2 years into
    studying and understanding UNIX. This is the second edition of the
    Beginers Guide To Trojan Hacking, in the first one we used Netbus, but
    this time we're gonna use one thats a bit more complicated, and more up
    to date. This program was written by The Cult of the Dead Cow, not me.
    I must take this opportunity to tell cDc thanks for not selling out all
    these years.

    2. FAQ's

    1 - To get into anothers computer, both computers must be turned on, and
    online
    2 - Yes this program does sometimes screw up, just turn it off and back
    on again
    3 - Unless you have actually paid for the Trojan, you do have an Illegal
    compy
    4 - There must be a remote program installed on the other persons comp
    before you will be able to connect to it
    5 - If you actually read all of this, you either a newbie, or an idiot

    3. What You Need

    Well first you need the trojan of the day, Back Orifice, more commonly
    called BO in hacker world, and yes its very easy to find, but fo this
    tutorial you'll need BO2K, which is the latest and greatest version.
    To get yourself a copy of BO2K you could simply type that word in on
    almost any search engine, and viola you have hundreds of answers to your
    query, I will also provide you with a good download spot which is on one
    of my friends domains, so that it probably won't be removed for a few
    years. You'll also need an IP sniffer which
    I will tell you more about later.

    Downloads:

    Back Orifice 2k : thehackers.freeservers.com
    https://www.starwarshq.com/sniffer.zip

    ***If those don't work try changing the files to all caps, or just the
    extensions as caps, if neither work they aren't there no more, so just
    go to altavista or something***

    4 - How To

    How to, how too, how two. Ok I'm through, welcome to the next trojan
    you wanna be hackers are gonna learn how to use. Back Orifice,
    written by the guys at cDc, the few who haven't turned narc, or if
    they have, they didn't let any of us know. Anyway, as in volume 1
    the trick to accessing someone else's computer comes through the use
    of there IP number, that little address you need to connect too.
    And also, as with Netbus, you have to have another file on that
    persons computer before it will work. So a quick skinny into ICQ
    (same as last edition), and then we'll get to the hacking stuff.

    ___ICQ you know what it is 60% of the people who are online have ICQ, if
    you want to hack your friends, you'll need this, ICQ serves two purposes
    one it tells you whether or not your friends are online, and two it
    gives the all useful thing called a UIN number, which is there user
    number on ICQ, you can find it after clicking on there name, and finding
    out all of there information (and yes sometimes, under there information
    you will see there IP address), but most of the time you won't see there
    IP address, so put there UIN number into the ICQ IP Sniffer which you
    should have downloaded by now. And again viola you have there IP.____

    Ok first unzip your bo2k, you should have a few files, a bo2kgui, a
    bo2k, and a bo2kcfg. Well first lets start with the bo2kcfg. This
    little file is your "Wizard" into someone's computer. When you run
    this program you will configure the port, and the password to someones
    computer. Yes you heard me right, after your done with this program
    you will configure both the port and the password onto a remote comp.
    Try to choose a high port number, as lower port numbers are ussually
    monitored by a number of devices.

    Now when you run bo2kgui, it will already be configured for everything
    you set up in bo2kcfg, it doesn't need you to tell it the port # or
    stuff like that, and hit the connect button, and hey your inside
    someones computer. Now the file bo2k, is like patch.exe from Netbus,
    this is the program you have to execute on the unknowledgable victim
    of your hacking (feel free to rename it to whatever you like).

    Once the program is on there computer, you've got there IP, now you can
    connect to there computer. Simply go to file, New Server, type in the IP
    and connect. Hey its that simple. I'm not going to go into detail about
    the commands and such once your in until the next volume, but for now
    just think of it as DOS, because basically thats what it is. In my next
    volume I will discuss this in more detail, but till then.

    5 - Protection

    Ok, now for the protection part of all this hacking stuff that you have
    now come to enjoy. Yes, there are programs that stop back orifice, and
    some that even detect it. However these programs are hard to find, and
    even less of them work worth anything. Most servers won't even detect
    it when installed. But if the admin of the server, updates the virus
    software every other day, then your probably out of luck. But if you
    have a lazy sys admin, you'll probably be just fine. Now stay out of
    trouble, and happy hacking.

    6-7- Why to do it, and Ethics

    Well here's the end, you may get into other peoples computers just to
    freak them out by opening there Cd rom tray dozens of times. But you
    take it past the point of hacking, and of morals when you begin to do
    damage to there computer.

    1. Don't alter or delete any files, other than those to protect yourself
    2. DO NOT hack government computers
    3. Yes you can be traced if your not careful, so please take head

    The Hacker Manifesto

    This is our world now... the world of the electron and the switch,
    the beauty of the baud. We make use of a service already
    existing without paying for what could be dirt-cheap if it wasn't
    run by profiteering gluttons, and you call us criminals. We
    explore... and you call us criminals. We seek after knowledge...
    and you call us criminals. We exist without skin color, without
    nationality, without religious bias... and you call us criminals.
    You build atomic bombs, you wage wars, you murder, cheat, and
    lie to us and try to make us believe it's for our own good, yet
    we're the criminals.

    Yes, I am a criminal. My crime is that of curiosity. My crime is
    that of judging people by what they say and think, not what they
    look like. My crime is that of outsmarting you, something that
    you will never forgive me for.

    I am a hacker, and this is my manifesto. You may stop this
    individual, but you can't stop us all... after all, we're all alike.


    ---Mentors Hacker Manifesto

    ***Look for more tutorials to come, this is the second of many***


    w w eeeee aaaaaa ppppppp ooooooo n n n n
    w w e a a p p o o nn n nn n
    w w e a a p p o o n n n n n n
    w w w eee aaaaaa ppppppp o o n n n n n n
    w w w e a a p o o n n n n n n
    w w w w e a a p o o n nn n nn
    w w eeeee a a p ooooooo n n n n

    Weapon N






    THIS ISNT MINE!!

  11. #26
    Inna's Avatar
    Join Date
    Jun 2007
    Gender
    male
    Posts
    11,161
    Reputation
    61
    Thanks
    270
    My Mood
    Tired
    It seems to me that trojan hacking is not that powerful after reading that -.-'.

  12. #27
    DoubleDutch's Avatar
    Join Date
    Sep 2007
    Gender
    male
    Location
    Koning
    Posts
    11,253
    Reputation
    1149
    Thanks
    1,174
    My Mood
    Bored
    Bc its fake

  13. #28
    bigmbn1999's Avatar
    Join Date
    Jun 2009
    Gender
    male
    Posts
    4
    Reputation
    10
    Thanks
    0
    What did this guy do to deserve your revenge?

  14. #29
    GG2GG's Avatar
    Join Date
    Mar 2008
    Gender
    male
    Location
    United Kingdom
    Posts
    3,382
    Reputation
    21
    Thanks
    4,294,967,295
    My Mood
    Blah
    Quote Originally Posted by Kanna View Post
    That's already posted =S. Ask your friend please, the guy is a fucking bitch that can't do shit and needs to be owned.
    hes full of shit you cant just pick an ip and hack it.

    Quote Originally Posted by Kanna View Post
    It seems to me that trojan hacking is not that powerful after reading that -.-'.
    trojans dont even do damage, trojans arnt a type of file/virus. its just a method of getting your virus or a program onto a pc to open a back door. connected to another file or sneaking onto the pc with somthing else.



    edit

    True hacking involves massive codes, passwords, and
    something most good hackers like to call UNIX

    ROFL AHAHAHAHAHAHAHAHAHHAHAHAH fucking posers book mate

    UNIX IS A FUCKING OS/OSBASE not the name for hacking with "lots of code and passwords"
    Last edited by GG2GG; 06-11-2009 at 02:01 PM.

  15. #30
    mac_man's Avatar
    Join Date
    Dec 2008
    Gender
    male
    Posts
    275
    Reputation
    10
    Thanks
    65
    Quote Originally Posted by Putin View Post
    hes full of shit you cant just pick an ip and hack it.



    trojans dont even do damage, trojans arnt a type of file/virus. its just a method of getting your virus or a program onto a pc to open a back door. connected to another file or sneaking onto the pc with somthing else.



    edit

    True hacking involves massive codes, passwords, and
    something most good hackers like to call UNIX

    ROFL AHAHAHAHAHAHAHAHAHHAHAHAH fucking posers book mate

    UNIX IS A FUCKING OS/OSBASE not the name for hacking with "lots of code and passwords"
    i said i have a friend that might know this stuff i never say he actualy knows how to do it

Page 2 of 3 FirstFirst 123 LastLast

Similar Threads

  1. [Help Request] FET I NEED YOUR HELP! PM ME!
    By FetJr in forum Combat Arms Help
    Replies: 3
    Last Post: 07-08-2011, 10:29 AM
  2. I need Your Help [KSSN]
    By AloneInTheDark in forum General Game Hacking
    Replies: 9
    Last Post: 02-27-2008, 09:34 AM
  3. Really Really Need Your Help Quickly !!!!
    By .-=m1k3y=-. in forum Suggestions, Requests & Help
    Replies: 19
    Last Post: 08-30-2007, 03:02 AM
  4. i realy need your help
    By neofytos in forum WarRock - International Hacks
    Replies: 2
    Last Post: 07-26-2007, 06:13 PM
  5. i need your help
    By usmrean in forum WarRock - International Hacks
    Replies: 1
    Last Post: 07-12-2007, 02:22 PM