S.O.T.A. Revolution     |   home
Hacking Documents   |   Ancient Rune 1   |   Ancient Rune 2   |   Ancient Rune 3   |   Basic UNIX FAQ   |   Basic Usage UNIX Commands   |   Becoming a Uebercracker   |   Hacking: A State of Mind   |   Hack Kit   |   Neophyte's Guide to Hacking   |   The Hackers Manifesto   |   Newbie's Handbook   |   The Official Phreaker's Manual   |   The UNIX File system   |   Virus FAQ
Ancient Rune 2
Having FUN with a Trojan horse:

WHAT the HECK is a Trojan horse??

Of course most people know what this is but if you don't know then I'll tell you. It a little program the basically lets you network someone's computer to yours (usually undetected!). This allows you to steal files, chat with the "victim", and much other great stuff.
     For today's lessen, we will be using a lesser-known Trojan called SubSeven. You can download it at http://subseven.slak.org. The main program that you run is called subseven.exe. The program you have to get on the "victims" computer is called server.exe. Now I'm not going to get into social ethics or anything but you can figure out a way to get it on their comp somehow.
     Ok, when they run the program (first u have to run editserver.exe to edit the server program to e-mail you the "victim's" IP address) the program will send you the info on how to access it thru IP. Run subseven.exe type in the address at the top of the window. Hit connect, and you're ready to go! Now, play around with it. Now lets see how much info you can get on this person. Click the get PC info and the get home info buttons. There are many other great features that are possible to use with this Trojan and other Trojans can do other stuff also.
     So go search for the right Trojan to use and start hacking today!!
If u have any questions about Trojan horse you can ask me, Deathbyc4@yahoo.com . Thanks!

By: DeathByC4, edited by DarkeFire