💾 Archived View for gemini.spam.works › mirrors › textfiles › uploads › begtrojhak2.txt captured on 2023-01-29 at 12:47:34.

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

/////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////
\\\                                                               \\\
\\\             THE BEGINERS GUIDE TO TROJAN HACKING              \\\
\\\                   VOLUME 2 - Back Orifice 2K                  \\\
\\\                                                               \\\
\\\                          BY WEAPON N                          \\\
\\\                                                               \\\
\\\                           01/17/00                            \\\
\\\                                                               \\\
/////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////


is that you don't modify it in any way.  If you would like to give
me a yell then by all means come and find me**************



1. Introduction

2. FAQ;s

3. What You Need

4. How To

5. Protection

6. Why To Do It

7. Hacker Ethics/Code



next month, so please come and check back.  This is due to the
changing of Sniffers, ICQ's AOL stuff and such, so we'll give you
more up to date information if we need too****


_____________________________________________________________________

1. Introduction

Welcome to the wonderful world of trojan hacking, for those of you who
don't know what trojan hacking is,  trojan hacking is simply the use of
a program to gain access to another persons computer.  Hence this is
not true hacking.  True hacking involves massive codes, passwords, and
something most good hackers like to call UNIX, yes for almost a year
and a half I was a Trojan hacker, but now I'm a good 2 years into
studying and understanding UNIX.  This is the second edition of the
Beginers Guide To Trojan Hacking, in the first one we used Netbus, but
this time we're gonna use one thats a bit more complicated, and more up
to date.  This program was written by The Cult of the Dead Cow, not me.
I must take this opportunity to tell cDc thanks for not selling out all
these years.

2. FAQ's

1 - To get into anothers computer, both computers must be turned on, and
online
2 - Yes this program does sometimes screw up, just turn it off and back
on again
3 - Unless you have actually paid for the Trojan, you do have an Illegal
compy
4 - There must be a remote program installed on the other persons comp
before you will be able to connect to it
5 - If you actually read all of this, you either a newbie, or an idiot

3. What You Need

Well first you need the trojan of the day, Back Orifice, more commonly
called BO in hacker world, and yes its very easy to find, but fo this
tutorial you'll need BO2K, which is the latest and greatest version.
To get yourself a copy of BO2K you could simply type that word in on
almost any search engine, and viola you have hundreds of answers to your
query, I will also provide you with a good download spot which is on one
of my friends domains, so that it probably won't be removed for a few
years.  You'll also need an IP sniffer which
I will tell you more about later.

Downloads:

Back Orifice 2k : thehackers.freeservers.com
http://www.starwarshq.com/sniffer.zip


extensions as caps, if neither work they aren't there no more, so just
go to altavista or something***

4 - How To

How to, how too, how two.  Ok I'm through, welcome to the next trojan
you wanna be hackers are gonna learn how to use.  Back Orifice,
written by the guys at cDc, the few who haven't turned narc, or if
they have, they didn't let any of us know.  Anyway, as in volume 1
the trick to accessing someone else's computer comes through the use
of there IP number, that little address you need to connect too.
And also, as with Netbus, you have to have another file on that
persons computer before it will work.  So a quick skinny into ICQ
(same as last edition), and then we'll get to the hacking stuff.

___ICQ you know what it is 60% of the people who are online have ICQ,  if
you want to hack your friends, you'll need this, ICQ serves two purposes
one it tells you whether or not your friends are online, and two it
gives the all useful thing called a UIN number, which is there user
number on ICQ, you can find it after clicking on there name, and finding
out all of there information (and yes sometimes, under there information
you will see there IP address), but most of the time you won't see there
IP address, so put there UIN number into the ICQ IP Sniffer which you
should have downloaded by now.  And again viola you have there IP.____

Ok first unzip your bo2k, you should have a few files, a bo2kgui, a
bo2k, and a bo2kcfg.  Well first lets start with the bo2kcfg.  This
little file is your "Wizard" into someone's computer.  When you run
this program you will configure the port, and the password to someones
computer.  Yes you heard me right, after your done with this program
you will configure both the port and the password onto a remote comp.
Try to choose a high port number, as lower port numbers are ussually
monitored by a number of devices.

Now when you run bo2kgui, it will already be configured for everything
you set up in bo2kcfg, it doesn't need you to tell it the port # or
stuff like that, and hit the connect button, and hey your inside
someones computer.  Now the file bo2k, is like patch.exe from Netbus,
this is the program you have to execute on the unknowledgable victim
of your hacking (feel free to rename it to whatever you like).

Once the program is on there computer, you've got there IP, now you can
connect to there computer.  Simply go to file, New Server, type in the IP
and connect.  Hey its that simple.  I'm not going to go into detail about
the commands and such once your in until the next volume, but for now
just think of it as DOS, because basically thats what it is.  In my next
volume I will discuss this in more detail, but till then.

5 - Protection

Ok, now for the protection part of all this hacking stuff that you have
now come to enjoy.  Yes, there are programs that stop back orifice, and
some that even detect it.  However these programs are hard to find, and
even less of them work worth anything.  Most servers won't even detect
it when installed.  But if the admin of the server, updates the virus
software every other day, then your probably out of luck.  But if you
have a lazy sys admin, you'll probably be just fine.  Now stay out of
trouble, and happy hacking.

6-7- Why to do it, and Ethics

Well here's the end,  you may get into other peoples computers just to
freak them out by opening there Cd rom tray dozens of times.  But you
take it past the point of hacking, and of morals when you begin to do
damage to there computer.

1. Don't alter or delete any files, other than those to protect yourself
2. DO NOT hack government computers
3. Yes you can be traced if your not careful, so please take head

The Hacker Manifesto

This is our world now... the world of the electron and the switch,
the beauty of the baud. We make use of a service already
existing without paying for what could be dirt-cheap if it wasn't
run by profiteering gluttons, and you call us criminals. We
explore... and you call us criminals. We seek after knowledge...
and you call us criminals. We exist without skin color, without
nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and
lie to us and try to make us believe it's for our own good, yet
we're the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they
look like. My crime is that of outsmarting you, something that
you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this
individual, but you can't stop us all... after all, we're all alike.


---Mentors Hacker Manifesto




w       w eeeee aaaaaa ppppppp ooooooo n     n          n     n
w       w e     a    a p     p o     o nn    n          nn    n
w       w e     a    a p     p o     o n n   n          n n   n
w   w   w eee   aaaaaa ppppppp o     o n  n  n          n  n  n
w   w   w e     a    a p       o     o n   n n          n   n n
w w w w  e     a    a p       o     o n    nn          n    nn
  w   w   eeeee a    a p       ooooooo n     n          n     n

                          Weapon N