💾 Archived View for spam.works › mirrors › textfiles › uploads › yahell.txt captured on 2023-06-16 at 21:00:34.
-=-=-=-=-=-=-
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ +\\ // //\\ || || |||||||||||| || || + + \\ // // \\ || || || || || + + \\ // // \\ || || || || || + + \\ // // \\ || || || || || + + \\ // // \\ || || || || || + + || //||||||||||\\ |||||||||||| ||||||||| || || + + || // \\ || || || || || + + || // \\ || || || || || + + || // \\ || || || || || + + || // \\ || || || || || + + || // \\ || || |||||||||||| ||||||||||| |||||||||||| + ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Yahoo Trojan Attack Guide Written by: Zero 12-16-2002 zerotextspy@yahoo.com YAHOOOOOOOOOOOOOOOOOOO! --------------------------------------------------------------------------------------- Introduction Ok, this is not a g-file on how to use a Trojan Horse. This is a file on how to launch a trojan attack on ordinary people using Yahoo in chat rooms. This is actually quite simple, but it can get aggrivating sometimes since some people have Norton AntiVirus, firewalls, etc. This is more of a begginers manual for breaking into other peoples computers. By the Way, to actually practice the information in this file is Illegal! If you are 16 years old, or older, then you can be charged as an adult, have your computer taken away, and be in some deep shit. So this file is for Informational Perposes only (ha ha thats funny). --------- Things you Need: The Internet Yahoo Messenger Satanic IP Stealer A Trojan Horse (hack'a'tack is good for beginners, NetBus Pro recommended) search www.google.com to find them -------- Preparing Ok, first, Open the Satanic IP Stealer program (do it out of a chat room or people will know what you are doing). Be sure you are connected to the internet when you open it, or else it will not show you your IP Address. When you open it, you will see your IP Address, copy your IP Address, or write it down or something. Now goto www.cjb.net . on cjb.net you will be able to hide your IP Stealing address (which you should do). In the blank box, write down what website you would like to have: EXAMPLE: http://this-is-my-ip-stealing-site.cjb.net This is FREE. Once you push the Register it button, it will take you to another page, where you give your actual website that it is going to cloak for you. When it asks for your real website, put in http://your ip address:666 . You need to Copy your IP address that you took from your Satanic IP Stealer program, and paste it in the box, then the :666 . EXAMPLE: http://56.343.234.32:666 The rest of the webpage you are signing up for, just select NO for everything, when it asks for your email address, just give them a bunch of bullshit like: afdaufdafyduafydiafyduyi@yahoo.com. Then type in your password, and register it. It should then take you to another webpage that says "Ok here is your link, congratulations". Click on the link, then look at the Satanic IP Stealer program, your IP address should pop up in the bottom of the box. If it doesn't, then you are an idiot and you need to redo everything. Now, copy the link it gave you, and save it somewhere. --------- The Attack Ok, now lets get to your Trojan. There should be a program that came with the Trojan that you have called "Server.exe". DO NOT OPEN IT. Right click on server.exe, and rename it to "myprogram.exe" or something like that. Now, go into a chat room on Yahoo. Find some idiot that want to download the program. You do this by telling them its a Game that you programmed, or a self extracting exe that is filled with porn pictures. First, you give them the Link that you chose from cjb.net. When they click the link, their IP Address will show up on your Satanic IP Stealer program. They will then inform you that the page did not load. Say something like "oh, I'm sorry, my web host is down, I'll just send the program to you". Now, on the message box, click the "Send File" button. Find the Server that your renamed. Now, send them the file. When they recieve the file, they will open it, and then you can connect to their IP Address that you got when they clicked on the link. Like I said, I am not explaining how to use the trojan, so figure it out yourself. Have Fun. -------- Covering Your Tracks When you do things like this, there is always a chance of getting caught, so it is logical to cover your tracks so it is harder for anybody to catch you. When you are in their computer, goto C:\Program Files\Yahoo!\Messenger\StoredIM , and delete EVERYTHING in that folder, this will delete your entire convorsation with the victim, that way he can never prove it was you. goto C:\Program Files\Yahoo!\Messenger\Profiles\victims_username\Archive\Messages and delete all the files in the folder. goto C:\Program Files\Yahoo!\Messenger\Profiles\victims_username\Archive\Conferences and delete all the subdirectorys in the folder goto C:\My Documents\victims_username\receive , find the program you send the victim, and delete it. When you are done in the victims comptuer, on your trojan, click on the "Kill Server" button. this will delete the server compleatly off of the victims computer. --------- Hope you enjoyed the Information that is for informational perposes only.