home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Matrix
/
Hacker's Matrix (nCite Software) (2003).iso
/
Data
/
hack0723.EXE
/
udthelp.txt
< prev
Wrap
Text File
|
2001-01-17
|
10KB
|
160 lines
=================
Undetected - Help
=================
Description:
A backdoor is a program that is designed to hide itself inside a target
host in order to allow the installing user access to the system at a later
time without using normal authorization or vulnerability exploitation.
Once installed it allows anyone who knows the listening port number and
the password to remotely control the host.
Intruders/administrators access the server using the client.
The server allows intruders to execute commands, list files, start silent
services, steal/recover passwords, upload and download files, manipulate
the registry, list windows, take screen shots as well as other options.
Undetected can be used as a backdoor or as well as an administration tool.
A person who wants to use it must know that in many countries this kind of
activity is against the law and that he is the only one responsable for using
Undetected (DISCLAIMER).So if you want to respect the law (I suggest to do it)
delete the server file RIGHT now and stop using Undetected.
How to use it:
First you have to edit the server on your computer using the Edit Server included
in the client (more on that later) and ,if you want,bind the server with another file
(executable,photo,wave,mp3,etc ...).The next step,after you test the server with your
settings (not necessary),you find a person (let's call it "victim") and send the server.
After he/her runs the server ,if you setted an ICQ notification,you will receive a
message on your ICQ.The last step is to run the client,enter victim's IP number in the
IP edit box, enter victim's port number in the PORT edit box then hit the CONNECT
button ... and ,if it connects then ... the phun begins!
Edit server explained:
* startup methods
Undetected comes with 5 autostart methods used by the server to start on every Windows boot.
Use one of them depending on the victim you want to infect.If it knows about trojans I
recommand using the unknown or the unknown 2 method
1.registry - the server will write (some stuff) in the registry.If you use this method fill
in the edit box near it with the description of the key in Registry.
This method is used by many trojans and is well known.
2.win.ini - the server will write (some stuff) in win.ini - also well known
3.system.ini - the server will write (some stuff) in system.ini - less known
4.unknown method - no description
5.unknown method 2 - the only info I will give about this is that if you want to use it you
must keep the server filename 6 characters long (in case you want to rename it)
* ICQ notification
Just put here your ICQ uin.The server will use it to send you a notification when the victim
runs it.
*general options
1.start on port - enter here the port that will be used by the server
2.password - server's password (to prevent intruders to steal your precious victim)
retype - retype the password
3.fake error - the server can display an error message when the server runs for the first
time (if you leave it blank then no error will be displayed)
4.victim's name - the nick to identify your victim (when you receive ICQ notification)
5.add size - add some extra bytes to the end of the server to make it bigger
(sometimes usefull)
*keylogger
1.enable offline keylogger - check this if you want to spy your victim's chats,passwords ...
(everithing he writes whith his own damn f...ing keyboard)
2.log keys to - path : if you want to use the keylogger you must specify the path/file name
where to log the keys
*binder options
1.bind with file - select the file you want to bind with
2.extract to directory - select the directory where to extract the binded file
3.result - the file with the two files inside
After you edited these settings press the WRITE SETTINGS button to modify the server.
You can change it's icon by double clicking on the icon rectangle ,selecting an icon
(766 bytes) and pressing the WRITE ICON button.
To keep it's size small ,Undetected keeps the unimportant functions in files (.dll) called
plugins.To use these functions you must ,after connecting to the victim,install these plugins
by pressing the INSTALL button from "Plugins manager" or by uploading manually the plugin
in your victim's Windows directory.
Undetected client explained:
*the file manager is used to browse on your victim's computer.You can create/remove directories/
files,copy/remove files,retrieve files length,download files (in your Undetected directory)
*upload/capture - from here you can upload/download files in/from your victim's computer or
take screen shots/control mouse clicks with the screen preview plugin (install it first)
Screen Preview window: set the quality and the size of your screen dumps and then press
CAPTURE button to take one single screenshot or START VIDEO ,then CAPTURE to take multiple
screenshots,one after other,depending on the connection.
- allow mouse clicks - if you check this option you can press mouse buttons on the little
screen (after you take the screenshot) and play a little with the victim's mouse
- write all dumps in order - write the screenshots on your HDD as capt1.jpg,capt2.jpg,
etc ... if it is unchecked then the screenshots will be saved in a single file :capt.jpg
*informations - get some informations about your victims (including keylogger's filename)
*passwords (the most usefull function in my opinion)
You can get allmost all the passwords from your victim's computer.
-cached passwords - windows cached passwords
-ras passwords - Dial-Up passwords (if they are saved)
-recorded passwords(TM) - when the server is running it filters all the passwords under the
'*' characters -not the HTML ones -(if the victim does not save the Dial-Up passes,this
function is gold)
-save passwords -saves the retrieved passwords in a file called "passwords.txt" (Undetected
directory)
*win manager - shows active(visible/invisible) windows opened on victim's computer.
you can play with them ... close them ,send keys,set their caption ...
also from here you can add/delete registry keys
*script/chat
use the script to make and run invisibly .bat files,.vbs files
just write down some batch commands and ,after setting file's name and path,click REWRITE to
create the file and then click SPAWN to run it
if you want to add more batch commands/text to an existing file without deleting the old stuff
that it has inside,click the APPEND button
to chat with your victim,change your nick by clicking the NICK button then OPEN CHAT
*plugins
use plugins manager to install the plugins (the .dll's must be in the same dir as the client)
compression/decompression plugin (you must install it first) - use it to compress the files
before uploading/downloading
after downloading a compressed file use the local program called "compressor.exe" to
decompress it
*fun manager (you must install fun.dll first) - the useless part of Undetected and of any
trojan;use this functions to play with your victim
not all the functions from fun.dll are listed here coz I'm too lazy to make a button for
every lame function (I can make more fun functions ... but I don't want to ... upload another
trojan if you want to use these stupid functions)
*commands
here you can send commands manually to the server or ,in case you want to make a plugin,here
is the place where you can use/test it.
more on plugins later ...
server reply - data received from server if you use your own plugins
*server options
1.close server-closes the server until next reboot
2.remove the server-removes the server (but will not close it-use "close server")
it is necesarry to use "remove server" after you test it on your computer
every time you change the settings with the edit server and run the server to see if
it works,after testing remove the server by pressing this button
3.edit the server-same as the little "E" button - shows the edit server window
4.reboot victim's computer-guess ...
5.kill keylogger until restart-use this if you want to download keylogger's file;if you
dont use it,the server can fuck up
6.disable/reenable ICQ notification-guess ...
7.change server's port/password-as the name says ...
*client options-here you can customize the colors/skins for the client
About plugins:
To make your own plugin to add your own functions to Undetected see /work directory
there is a Delphi example on how to make a plugin
to execute a function from a plugin use the following command in "custom commands":
exec;[plugin.name];[function.name];[first.parameter];[second.parameter]
the first parameter is a number,the second is a string depending on the function you want
to execute
Example:
to install irchole in c:\mirc\ send the following command
exec;irchole.dll;irch;0;c:\mirc\
another example of a function that exists in fun.dll but has no button in the "fun manager"
exec;fun.dll;nuke;0; - will execute the "nuke desktop" function (very nice func)
Hope this help responds on many questions and I will be NO MORE bothered with stupid
lame,sily,idiot questions like "how to connect","how to use",blah,blah ...
I WILL DELETE THIS KIND OF MAILS.
tutorial writed by knox_rw
The Dark Side Crew 2k01