title 1 Welcome to THE WHITE HACKER TUTORIAL

DISCLAIMER


The creator of this site or the ISP(s) hosting any content on this site take NO responsibility for the wayyou use the information provided on this site. These files and anything else on this site are here for privatepurposes only and SHOULD NOT BE DOWNLOADED OR VIEWED WHATSOEVER! If you areaffiliated with any government, or ANTI-Piracy group or any other related group or were formally aworker of one you CANNOT enter this site, cannot access any of its files and you cannot view any of thefiles. All the objects on this site are PRIVATE property and are not meant for viewing or any otherpurposes other then bandwidth space. DO NOT ENTER whatsoever! If you enter this site you are notagreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by BillClinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or companystoring these files.DISCLAIMERDO NOT VIEW THIS SITE IF YOU ARE SEEKING TO PARTICIPATE IN ILLEGAL ACTIVITIES. FURTHER INFO WILL BE PROVIDED AT A LATER DATE REGARDING THE CONSEQUENCES OF ILLEGAL ACTIVITIES STEMMING FROM INFO RECEIVED FROM THIS SITE.This site does not store any files on its server. All contents are provided by non-affiliated third parties.

Friday, June 13, 2008

REMOTE HACKING

Remote Hacking
In this tutorial; you will learn how to access a computer's friend through a simple conversation on MSN. Its quite easy, but most people consider the contents of this document to be more of a 'script kiddie' actions.

Script Kiddie: n00b-hackers who consider themselfes to be powerful because of the tools they have obtained rather then the hard powerful way real hackers use.

But anyways, script kiddies <3> Run... and type 'cmd.exe', type 'netstat -n' whilst sending the file and you will have a list of IP addresses. The first few are yours, now scroll down, and you see his 'foregin IP', write it down on a paper.

Yeah! You got his fricken' IP address! Now, lets perform our hacking!

Hacking Operation

Okay, well you know your friend's IP address. Aint that great? Lets perform our 411-hacking operation! okey: Poke your friend in the heart, yeah!
Okay, I got a bit hyper writing this tutorial till here, now lets continue.

Go to

http://library.2ya.com
and browse to: Trojans/Backdoors >> Trojan Horses >> Yuri RAT.
Now download Yuri RAT. Trojans work as a client/server direct-connection, meaning, you will send the server.exe (binded) with a simple innocent virus-free game, and send it to the victim.
The victim opens it, and starts playing the game, but in the background, a port with listening ears has been opened, you simply open the trojan's client and type his IP address, leave the default port, and click Connect, access granted.

No comments: