How to use Trojan Horses This is a "How to.." guide explaining the best and more useful way of using tro- yan horses.I won't teach how to use trojan horses cause their options are easy to use and don't need to be explained.I'll talk about things different from deleting someone's hard drive there are MUCH better ways to make his life impossible to live in.Yeah I'll talk about this in this guide. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= I hope you know what trojan horse is if you don't know I'll explain you what is trojan horse *Note for newbies A trojan horse is An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user. A legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and probably unwanted) by the user. ****************************************************************************************** So you now have some definitions what trojan horse is I hope you understand them.So first of all you must have all trojans clients cause you don't know what trojan client you'll need sometime. You must have both the new and old trojans clients.You must know all trojans ports so you can see with which one is your victim infected here I'll post some trojans ports. *Trojan ports Netbus(Default)-12345 TCP Back Orifice (Default)-31337 UDP WinCrash 1.03-5742 TCP WinCrash 2.0-2583 TCP Deep Throat-2140 TCP Silencer-1001 TCP Sockets de Troie-30303 TCP Devil-65000 TCP Girlfriend-21554 TCP Millenium-20001 TCP Masters Paradise-31 TCP Phineas-2801 UDP BackDoor-1999 TCP Back Orifice-31336 UDP Evil FTP-23456 TCP Executor and HTTP-80 TCP FTP-21 TCP ****************************************************************************************** You see your victim is infected with one of them.Now It depends on the trojan the victim is infected but the most trojans have the common functions like start a keylogger,FTP access full downloading and uploading, set a password on the victims computer so only you can use it,even change the port of the machine. Of course there're many other options but I'll talk about this one now. So you see the victim is infected with Netsphere cause port 30100 is open(this is just an example the victim can be infected with Sub7,Netbus,BOK200,Master Paradise and any other trojan but this what I'll talk about is for EVERY trojan horse Remote Access of course Now you must find Netsphere's client on your hard drive if you don't have it download it from the net. Every site talking about hacking and trojans have it.Let's suppose you found the tro- jan client (I advice you to have all the trojans clients on your hard drive so you don't have to look for them). Now simple connect to the victim and the first thing you MUST do if you want the victum only for you is to set a password on the victim's computer and change the port. Of course is letting you to do this. Most of the trojans let you to do such things. Now you should check for cached passwords cause many people are saving their passwords. Now the important part the only one thing some people like and they're using the trojans- The Victim's Hard Drive. You can find a lot of useful information there cause this is someone's computer everything about him/her is there waiting for you to get it. DON'T delete anything. THis is the most stupid thing but EVERYONE is doing it. I understand you want to destroy your victim but there are MUCH MORE BETTER ways to do this and believe me there are more effective. Everyone can deletes someone hard drive but this is not interesting.You may find MANY interesting things on the victim's hard drive. So you're on their hard drive. Now you MUST look you any anti-virus or trojan scanner on their drive.I hope you know the most trojan and virus scanners. Norton AntiVirus,The Cleaner,LockDown F-prot,AntiViral Toolkit,Avast 32 etc. Now search their drive in the program files directory for such tools.Of course there are many other but you'll see the names in the directory and decide if this you find is something like the above things. Now let's suppose you found something on their drive. Go there and delete only some DAT DLL or EXE files. This will make the program not working but the other files will be still there. So the victim won't think someone deletes anything. He'll just reinstall the program and then install it again. Then you'll again delete it and again...... This is not good cause the victim can always install the program scan his drive and then connect to the net. He'll clean the hard drive and then you won't be able to connect to him. You may try to get everything about him in one evening or morning only.Then he may scan and clean the trojan but you'll have everything you want about the victim. *Note Believe me when someone is infected is he or she had a trojan cleaner they'll be clean. They are still infected that means that they're a real newbies and don't know what trojan horse is. I'll advice you to use THE NEWEST trojan that are not detectable by the virus and trojan scanners. ****************************************************************************************** Most people are talking via IRC (Internet Relay Chat).But if they give the option to the IRC client to log everything this will be useful for you. *Note If the victim didn't give the client option to log everything you can find him on IRC and meet him then talk a little and then ask him to do this.But don't forget to tell him what he'll win if he do this. This is vEry important.Tell him that he'll be able to read then all of his logs with his friends.Now he'll do it. ****************************************************************************************** Now go in the MIRC\logs directory on the victims hard drive (he might change the directory but you'll find it I'm sure). There you'll find all of this conversations with his friends now download all logs in the directory.The when you're off-line you'll read them and see who are the victims best friends.See if they told him important and secret things.If you find something go on IRC and find his friend and tell all the things you know to him/her.They'll ask you who told these secret things. Tell them it was their "friend" your victum.Haha I think this is BETTER than deleting files.But there's more. Now you must see his other friends on ICQ.GO in the ICQ directory in NEwDB directo- ry and download all .dat files there's his password and all the things he talked with his friends. Take the password and his contact list and start talking stupid things to his friends. After this you'll leave you victim without friends. This is better than deleting I told you. Now go and search for something interesting on his hard-drive. There're a lot of people who wri- tes their passwords on their computer web page passwords,e-mail passwords and other. Search for something like IMPORTANT directory or something like that. There you'll find interesting things IF you find password hack his web page and e-mail address. This will destroy him believe me. Well there are the things which are better then deleting everything believe me when someone loose all of his friends,his e-mail address,his web page and important information on his hard-drive YOU ARE COMPLETELY DESTROYED. That's the guide but there'll me more and more just keep reading if you like the guide or you have any questions about it,or you want some other guides you can contact me at: dancho@schoolsucks.com Bye and I hope this guide will be useful for you.As I told you I'm only telling you how to do this not to do it. I don't take any responsibility about anything happened after reading this guide. Author: tH3 m4n!4c contact me at : dancho@schoolsucks.com