Design March 2015 ~ EthiCal HaCkeRs
  • Keyloggers

    Keyyloggers Tools and Tutorials. Learn how keyloggers work and how to use them . ...

  • Cookie Stealers

    Cookie Stealers Tools and Tutorials. Learn how Stealers work and how to use them ...

  • Botnets

    Botnet Tools and tutorials. What is Zeus and Citadel bot and how to use them . ...

  • RATS

    Remote Administration tools and tutorials. ...

  • Website Hacking

    How to Hack Websites Vulnerabilities tools and tutorials ...

Zeus Botnet Full Tutorial

This Tutorial is for education purposes ONLY and I am NOT responsible in any way on how you use the information provided and what you do with the files. Thank you and enjoy reading.

Citadel Botnet Setup Full Tutorial Guide

Citadel Botnet Setup Full Tutorial Guide with Clean Builder


Today i am going in to introduce new botnet is called CITADEL ZEUS BOTNET its an latest version of ZEUS.




Download Citadel  







Contents =
==============


1. Description and facilities.
2. Setting up the server.
2.1. HTTP-server.
2.2. The interpreter PHP.
2.3. MySQL-server.
2.4. Control Panel.
2.4.1. Setting.
2.4.2. Update.
2.4.3. File / system / fsarc.php.
3. Setting Bot.
4. Working with BackConnect.
.


==============================
= 1. Description and facilities. =
==============================
ICE9 - software to steal personal user data from remote systems, Windows. On
plain language of "Troy", "backdoor", "virus". But the author does not like these words, therefore, further documentation
He will call this software "Bot".


Boat is fully based on the WinAPI Interception in UserMode (Ring3), this means that the bot does not use
no drivers or downloads in Ring0. This feature makes it possible to run even from Bota
Guest Account Windows. Plus, it ensures greater stability and adaptability
subsequent versions of Windows.


Bot is developed in Visual C + + version 9.0 +, with no additional libraries are used
Type msvcrt, ATL, MFC, QT, etc. Bot code is written with the following priorities (in descending order):
1. stability (carefully checked all the results of the call functions, etc.)
2. size (to avoid duplication of algorithms, repetitive calls, functions, etc.)
3. speed (not the type of instruction while (1 ){..}, for (int i = 0; i


Functions and features bot:
1. Sniffer traffic for the protocol TCP.
1.1. Interception of FTP logins on any port.
1.2. Interception of POP3 logins on any port.
1.3. The interception of any data from the traffic (a personal request).


2. Intercepting HTTP / HTTPS requests to wininet.dll, ie all programs working with this
library. This includes Internet Explorer (any version), Maxton, etc.
2.1. Substitution ..


3. The functions of the server.
3.1 Socks4/4a/5.
3.2 Bekkonekt for any services (RDP, Socks, FTP, etc.) on the infected machine. You can
access to a computer that is behind a NAT, or, for example, that
banned from the internet connection.
3.3 Getting a screenshot of your screen in real time.
- Do not add ---







- 2.3. MySQL-server. --
----------------------
MySQL is required to store all data on botnete. The recommended version is not lower than 5.1.30, as well
worth considering that when the control panel in the older versions have some
problem. All table control panel, go to a MyISAM, it is important to optimize
speed of work with this format, on the basis of the available server resources.


We recommend the following changes to the MySQL-server setup (my or my.ini):


max_connections = 2000 # Or higher


Download MySQL: http://dev.mysql.com/downloads/






To nix-systems exhibit the right:
. - 777
/ system - 777
/ tmp - 777






ALL FOR EDUCATION PURPOSE ONLY I AM NOT RESPONSE FOR ANY HARM FULL INFECTION OF SYSTEM ETC-

Crypter Tools Make Your Sever Undetectable FUD

Crypter Tools

All Crypter Collection

Super Phisher (Fake Login Page Creator)


Download Now

Rar Pass: leet

Ardamax Keylogger Tutorial

Ardamax Keylogger Full Step By Step Tutorial

Step 1: Download Ardamax Keylogger 


Step 2:
Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select “Enter registrationkey” and make it full version by entering serial key from Serial key.txt file.

Step 3: Now, again right click on Ardamax taskbar icon and select “Remote Installation” to see Remote Installation Windows, click Next on it.

Step 4: 
Click on “Next” to get Appearance screen. Here, click on “Additional components” and untick “Log Viewer” and hit Next.

Step 5: 
Now,on Invisibility screen, check all options and hit Next.



Step 6: Now, on Security screen, click on “Enable” and put the password (remember this pass- you’ll need this later). Check all boxes and hit Next.




Step 7: Now, you come to Options, and select options as you need. eg: It is better to have keylogger run after every restart – so tick “Run On Windows Startup” and so on. Click on Next.


Step 8: On “Control” screen, check the box “Send log every” and put time as 5/10 minutes(whatever you wants). Then, in delivery, check “Email”. Leave Include as it is. And uncheck “Send only if log size exceeds”. Proceed with “Next”.

Step 9: Now, on Email, enter as below:
Send To : Enter email id to receive keylogs
Username and password: Enter your any Username and pass of email id for sending Keylogs on your email id which yov have mentioned above.
Now hit “Next”.



Step10: In “Control” window dont change anything and hit “Next”.


Step 11: In “Screenshots” window, select options as you need and hit Next.



Step 12: In “Webcam” window, select options as you need and hit Next.




Step 13: In Screenshots screen, you can put your own values and hit “Next” to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer. Untick “Open the folder containing the keylogger engine” to avoid yourself from being keylogged. Choose the icon you want to use for keylogger.



Step 14: Now, click “Next” and then “Finish”.

Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection. For this, keylogger is crypted using FUD Crypter. I will not talk about this over here as I have written article on this FUD Crypter.
Note: Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don’t worry, I never play such cheap pranks of hacking my readers.