Sep 10, 2011 5 comments
How to hack with Trojan | Prorat tutorial
Prorat a famous trojan for hacking system, facebook, gmail, yahoo, twitter and other accounts. Today i wil show you step by step guide to hack with Prorat.
First of download Prorat from the given link
Then disable your antivirus. It is necessary other wise your downloaded trojan will be detected and deleted. Don't worry, it will not harm your system at this stage.
Now run Prorat.exe
You will see the prorat window. There are so many options but you have to create a server first.
So click on create server.
There will be 3 options
- Create Prorat server
- Create Downloader Server
- Create Cgi Victim List & usage
now click on create prorat server
A new window will popup. which will have a lots of options in side bar.
- General settings
- Bind with Files
- Server extnsions
- Server Icons
You have to use all options one by one to create a server.
Now in Notofication. Mark on Use Mail Notification and enter your email id. there will be a default id. Erase it and enter your. Then Test. It will send a testing mail to your email. Check your spam too.
Then Go to general settings and select all the options which you want to have in your trojan.
Then go to Bind with file and select file to bind your trojan with.
At last select your server extension and icon. Then click on Create server.
Now you have created a server.
Send this server file to the victim you want to hack, but before sending this file to victim make it FUD (Fully UnDetectable) with FUD cryptors. Search for this website for FUD articles.
after creating server FUD, it is ready to send to the victim.
Send this file to the victim. If the victim will run the server in the system, Trojan server will send you the notification email with the IP address of the victim. Use this ip and run your prorat.
At the top there is an option for IP and port. Enter thr IP and port and click on connect.
wait to connect.
After getting connected to the victim's system.. you can use any of the options available on the prorat to hack the user's system