<h1>CARDING FORUM</h1>

CARDERSHOP.CC CVV SHOP
BUY CVV / BUY DUMPS WITHOUT PIN
BEST CVV SHOP / CC SHOP
CVV SHOP ONLINE


Go Back   Carding Forum ¤ (carding forum, card fraud, carding board, darknet forum, darknet markets, credit card fraud, fraud, atm fraud, cvv shop, atm skimmers, emv chip dumps, dumps shop, credit cards cvv, credit cards cvv2, dumps, dumps with pin, cvv2, buy dumps, buy credit cards, dumps with pin for sale, fresh stuff, dumps 101, dumps 201, dumps+pin, buy dumps with pin) > English-speaking carders > Hacking & Coding > Articles
Members List Search Today's Posts Mark Forums Read

Reply
 
Thread Tools
Old 11-12-2010, 03:16 AM   #1
ADVs
Super Moderator
 
Join Date: Oct 2009
Posts: 347
Reputation: 134
Default A little tutorial on using trojans for real profit

This tutorial based on theory what you abitcoineady have a trojan for grabbing accounts and other private info of victim for you.

First of all after you bought trojan you need webserver, where all your logs will be kept. Using e-mail for it is a not a good idea. First your e-mail account can be stolen. Second thing is a restrictions on free box space and anti-spam features of mail provider. So if you have big botnet which send a lot of logs to you your account will reach free space and no new logs will be received and anti-spam feature can block most of mails sended to you by trojans. It’s hard to avoid anti-spam blocker coz all e-mail providers use their own anti-spam system and programmer should learn all that systems. It will take a lot of time and this game is not worth the candle.

So you need a hosting for storing logs. Most of hosting providers subtcort PHP, ASP, MySQL and other features so you need just to choose what hosting provider you like more then others. Almost all hosting acceptable for use it for keeping logs.
All scripts what you need for my spyware included in package so all what you need is upload it and set right permissions to the files.
One thing you need at your hosting is a PHP option “register_globals” to be On. So check your hosting provider to allow this feature before purchasing hosting.


So we have a hosting. Next we need to distribute trojan to as much victims as we can.
There is a lot of ways to do it
Running the exe file:

If it's someone you know, you could try tricking them into running the file. Make up some story to get them to run it. After they run it, they will be infected with it.
You could also have it "hidden in another exe file". This is called exe binding, if you search google for it you will find a dozen exe binders. What this does is you get some exe file, perhaps an actual game, bind it to trojan, and get them to run the new exe file. What this will do is after you say "I just got a cool game, check it out" and send them the game&trojan exe, they won't suspect anything because it actually is a game.

Using an exploit

There are several exploits for Windows, for Internet Explorer, etc. An exploit is a flaw in the program that you can exploit to do a desired task. For example, there was a flaw in Internet Explorer a while back which allowed you to give a link to someone that would display anthing you wanted in the address bar and it would go to whatever website you wanted (eg display "http://www.ebay.com" while it actually went to "http://www.yourfakepage.com". Anyway, if you can find out what operating system your victim is using, you could try to find an exploit on the internet that allowed you to run remote code on their computer.
Most popular is exploits for Internet Explorer which upload and run trojan at victims computer.

People, who using this way making a scam page where they place an exploit and trojan and make people to visit their page. So then victim visit swindler’s page he will be infected by virus. It’s simple, but you have to compel people to visit your site. For this swindler using SPAM or companies who sell traffic, clicks or pop-up banner shows. Swindlers card traffic companies and they get people to visit your page and get infection. How they do it is a other story and to explain it I will have to write another tutorial, so lets keep it undisclosed. Just they force people to visit your site

Using RTSW.Smash I-WORM or other trojan drobtcers:

Another way is using a viruses called i-worms. This is a self-spreading systems which spread to victims computer by itself. It uses e-mail, p2p network, operating systems vulnerabilities, other backdoors/i-worms or other methods of spreading to infect a victim. After infection such programs can download to a victim any program you wish to victim computer. It can be trojan or just a joke program. Anything what you want
So all you have to do is distribute i-worm as much as you can and just sit down and wait. Your botnet will grow by itself.
This small tutorial is only for learning. All things, described here is only for learning and showing flaw in a computer systems. I’m not responsible if someone will practice it. Keep in mind what all things described here is an illegal.

Sorry for my english. It’s not my native language.
Thanks to Itbook for help in writing this tutorial.
ADVs is offline   Reply With Quote
Old 17-03-2012, 04:54 AM   #2
bybydejau
Junior Member
 
Join Date: Aug 2011
Posts: 10
Reputation: 1
Default

thanks for this tutorial
bybydejau is offline Add Infraction for bybydejau   Reply With Quote
Old 09-05-2012, 10:39 PM   #3
frostj085
Member
 
Join Date: Mar 2012
Posts: 38
Reputation: 1
Default

nice tut enjoyed reading and Ur English was on point

but i have a question about Trojan drops:

1. how effective is this method of spreading
2. with a Trojan droper you only have to infect one machine right then after that it would spread from there onwards ?
frostj085 is offline Add Infraction for frostj085   Reply With Quote
Old 17-07-2012, 04:17 AM   #4
objectionable
RIPPER
 
Join Date: Apr 2012
Location: ICQ 7775718
Posts: 24
Reputation: 5
Send a message via ICQ to objectionable
Default

some spreading?
objectionable is offline Add Infraction for objectionable   Reply With Quote
Old 24-07-2012, 08:25 AM   #5
developer
RIPPER
 
Join Date: Jul 2012
Posts: 80
Reputation: 5
Default

Ok is nice info here
developer is offline Add Infraction for developer   Reply With Quote
Old 17-08-2012, 11:23 AM   #6
privileges
RIPPER
 
Join Date: Aug 2012
Posts: 22
Reputation: -9
Default

this best tutorial
privileges is offline Add Infraction for privileges   Reply With Quote
Old 06-10-2012, 03:13 AM   #7
destractions
BANNED
 
Join Date: Sep 2012
Location: Information
Posts: 27
Reputation: -1
Default

spyeye or zeus
to selling you logs,accounts,sites,shells do to traffic server
destractions is offline Add Infraction for destractions   Reply With Quote
Old 20-10-2012, 06:18 AM   #8
2012CarderPro
BANNED
 
Join Date: Oct 2012
Posts: 20
Reputation: -1
Send a message via ICQ to 2012CarderPro
Thumbs up

Quote:
Originally Posted by bybydejau View Post
thanks for this tutorial
same think
2012CarderPro is offline Add Infraction for 2012CarderPro   Reply With Quote
Old 20-10-2012, 10:53 AM   #9
ProfessionalsOnly
RIPPER
 
Join Date: Aug 2012
Posts: 111
Reputation: -3
Default

How about binding it to a video?
ProfessionalsOnly is offline Add Infraction for ProfessionalsOnly   Reply With Quote
Reply

Bookmarks


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
TUTORIAL**CC>UKASH>LR tutorial * iKKi Articles 11 09-08-2012 08:05 PM
Trojans and Loads/installs Load you Bots.exe Confirme Hacking & Coding 8 07-05-2012 04:42 AM
Cервис по Загрузкам: Profit-Install / Service on Loadings: Profit-Install Farro НЕПРОВЕРЕННАЯ РЕКЛАМА [ru] 0 25-02-2011 06:44 AM
Overdraft for fun and profit Uribe Beginners Questions 10 06-12-2010 02:41 PM


All times are GMT -5. The time now is 09:43 PM.