💾 Archived View for spam.works › mirrors › textfiles › uploads › maniac.txt captured on 2023-11-14 at 12:42:55.
⬅️ Previous capture (2023-06-16)
-=-=-=-=-=-=-
*-*-*-*- A guide to destroy someone's computer connected to the Internet *-*-*-*-*-* In this guide I'll explain you everything you should know about attacking and destroying some- one's computer via Internet.THIS GUIDE IS FOR EDUCATIONAL PURPOSES ONLY I DO NOT TAKE ANY RESPONSIBILITY FOR ANYTHING HAPPENED AFTER READING THE GUIDE.He I'm telling you only how to do this not to do it it's you decision hope I'm clear ok Here's the guide If I find something missing here I'll update it immediately.In order to know everything you MUST read all my other guides you'll find them everywhere if you can't find them mail me and I'll send them to you. THE MOST LAME THING IS TO CHANGE SOMETHING IN GUIDES OR PROGRAMS THE PERSON WHO WROTE THE GUIDE OR THE PROGRAM IS IT'S OWNER YOU SHOULDN'T CHANGE ANY- THING.DO AS YOU WANT WITH THEM BUT DON'T FORGET TO GIVE CREDIT TO THE AUTHOR. /*-/*-/*-/*-/-*/-/-/-*/-*/-*/*-/*-/-*/-*/-*/-*/-*/*-/-*/-/-*/-*/-*/-*/-/-/-/-*/-/-*/-*/-*/-/-*/-*/-*/-/* 1. First find a good and fast port scanner I'll recommend you to get everything from this URL www.system7.org it has everything or if you can't find it mail me and I'll tell you one. 2. The port scanner is very important cause you must know the opened ports of the victim's compu- ter so you can do the attacks and see other important things. 3. Now you must take the victim's IP so you can attack and scan him.It's very ease to get the IP if you're in IRC just write dns/here write the persons nick and you're ready.In ICQ you can patch your ICQ and then see the IP's of all people other ways is netstat go in DOS mode and write netstat then you'll see a list of all connections on your computer there you'll see the victim's IP 4. OK you've got the IP now scan the IP to see which ports are open on the computer.It's very impor- tant to know all ports I mean telnet,ftp,www, and of course the trojan ports I hope you know what trojan horse is if you don't know I'll put a little box down explaining what trojan horse is.If you know what trojan horse is therefore you should know that they are using ports some use common ports other use ports that can't be recognized so you should know all trojan ports if you don't know them or you're too lazy to learn them I'll put here a list of the most interesting and known trojans. So you have the list now start port scanning. Now let's imagine that the port scanner said the port 30100 on the victim's computer is open if you don't know what this port is about check the list.You'll see it's trojan horse port.The trojan name is Netshpere.So the victim is infected now you can forget about all attack's you can destroy his or her computer COMPLETELY.Now you must find Netsphere Client and connect to the computer.Now you can do EVERYTHING you want with the victim's computer.Here's a little advice from me YOU SHOULD FOLLOW people don't delete anything. For more information read my other guide about using trojan horses. 5.Now you can simple nuke him on port 139 if he is not patched this will disconnect him from the net and block his computer. 6.YOu can also send ICMP smurf and other attacks to the victim mass pinging is also good idea. The main idea is to flood the victim with data so he'll be disconnected from the net. 7.So now you have the victim e-mail address put them in many message boards with messages that everyone will reply.Mailbomb the victim subscribe him to as many mailing list you can find. 8.Not it's time to attack ICQ. Find some flooder and flood the victim with messages and URL's of course anonymous. This will burn the victim's ICQ completely. 9.Now find a port attacker and attack all of his open ports.This will close then and make IRC or ICQ crush. 10. Do all of this attacks at the same time especially the mail bombing this will annoy the victum a lot. Well use your imagination there are a lot of tools out there you just pick them and then attack The main idea of this guide is to flood the victim with data and disconnect or crush his computer -_-_-_-_-_-_-_-_-_-_-_ -_-_-_-_-_-_-_-_-_-_-_ -_-_-_-_-_-_-_-_-_-_-_ AUTHOR OF THIS GUIDE IS tH3 m4n!4c -_-_-_-_-_-_-_-_-_-_-_ You can contact me at dancho@mbox.digsys.bg