Saturday, June 23, 2007

Alexis Texas Does Not Like Black

MANUAL OF POISON IVY trojan 2.3.0

2.3.0 MANUAL OF POISON IVY By Raz! The


q
Well before I say anything that manual is 100% created by me!
clear that we are beginning! : 8):

* before anything downloaded q Trojan the

HERE * now run
* click on "new client"



* The following window appears



* listen on port is the port to listen!
* pasword (you know what makes jejeje q) then q
* configure it at will the port and give pasword click start


file
* now click on "new server"



* click on "create profile" and type cualkier name and click ok



* in the dns / port you are clicking on add and put your ip or no-ip domain, the same port q placed before and the same pasword
* give in test connections and will leave them like the picture! then click ok and then next



* select the ActiveX check box and click Startup
random * in file copy filename
* in place a name not so llamtativo q as q I got XD!
* want to select which folder to copy it to the server
* q select options like (melt, persistence, keylogger)
* once finished all click on next!



* mutex I recommend process q be left as they are and Change it if they only know what q!
q * by default is the server is injected into the process of msn, but if you wish to change clicker in the box and inject a custom process coloken the process q kieran!
* in format q I advise you to leave like this, change it if they know what q! * Click next




* if they want to change the icon delen click on icon and look for an icon!
* then click on generate, place the name q kieran the server and give in to keep (the server is created in the folder where you have poison ivy client 2.3.0) then give ok!

edited: ... q kieran to encrypt your servers with the theme or other, here I leave this!



as seen when they are configuring the server and come to this part! DO NOT select the box that says "third-party aplication Executed after build and give to "generate"
and ready and q have their servers then join with the q kieran (video, mp3, software, jpg), may pass them! I think I have no q q

explain XD edited: and taking the (s) victim (s) you will see this!



* double clicking on the victim displayed the following window



information: here appears the victim PC information

* files: here have access to the files of the pc victim! here by clicking the image ... right appear the following options!
refresh folder: to refresh the folder, rename this case, execute or delete something, clicking Refresh see the changes.
search: this used to search for specific files on the pc victim!
show thumbnails, this icon will show us the files! in my case was in the folder of images and can see the thumbnails! ideal if they want to download a specific image! XD
download: to download the pc cualkier d file to your pc
victim upload: to upload your file cualkier pc to pc victim!
execute: this brings us two options "excute => normal" that is visible to the victim and "excute => hidden" invisible to the victim that is so hidden!
rename: cualkier renaming file or folder in the pc victim!
delete: for deleting files in the pc victim



regedit: here we have access to the registration of our victim!



processes: shows active processes in the infected pc!
right-clicking on this window, see the following:
refresh: to refresh the folder!
show modules: This option is used to show q modules make up the process in which
kill process are: to kill selected process
suspend the process, to suspend the process if we are selecting
selected a module (as shown in the image ) shows the option "unload module" that allows us to make some modulo q q up the process will not load! (In this case I am selected the module "kernel32" the process of nod32)



services: here we see the victim's PC services ... right-clicking on any of them will appear the following:
refresh: refresh the window to save file
: creates a. txt with the description of the service!
start: if the service is stopped the start!
stop: help to stop an active duty
edit: to edit the service
install: install a service uninstall uninstall a service




windows: here you will see the windows that are open on the infected PC ... Clicking on any of these windows will appear the following:
capture windows to capture the window
show window displays in the victim's PC if this hidden
dq hide the window hides the window in the victim's PC
maximize the window maximized window in the victim's PC
minimize the window minimized pc window closes victim
close window pc
victim


active ports for active ports on the victim's PC



* remote shell for MS-DOS console the victim .. . activate it by clicking on activate and we can clean the window and save records



key logger to record keystrokes on the victim's PC ...! to give him then right click refresh and ready ... we also have the option to save a plain text file and clean the window!

remember activate the option in the creation of server!

screen capture device to capture the screen of the victim and from there to manage it!



Quote: mandiubi
Stretch:
used to adjust the display of the victim in the window.
Mouse:
used to handle the victim's mouse to click on and where we want.
Keyboard:
used to handle the keyboard of the victim and to write wherever we want.
Interval:
is the interval of time that is taken over and captured.
Start:
starts capture screen shots below.
Single:
capture a single snapshot.
Save:
used to hold the screen to a file. If you select "Autosave" It was kept all that are caught.
Options:
used to change the size and quality of the screen.

capture webcam camera to capture our victim

Quote: mandiubi
Stretch:
as in the screenshot, is used to adjust the image to the window.
Interval:
the time interval between each capture.
Start:
start to capture images.
Single:
captures a single image.
Driver:
sample web cameras installed on the victim's PC. You can select anyone for the button "Activate" activate it. If there is no camera will be "No webcam installed!"
Save:
to save the image to a file. With "Autosave" automatically saves all. Id

edit to change the name of the victim!
Share: used to share the connection of the server! that is, as another client
DNS / Port: here we will add the ip or no-ip account to connect the server q
ID: here is the name of the victim! q will see in the new "client"
Password: q key to the new client will connect
Run in Same Process / New Process: Here the server will run in the same process was anteriormentew q or a new one!
Privileges: q are the privileges will be given to new customer!



update: to add a new server to the infected pc and replace the old one!
restart to reset the server
uninstall to uninstall the server on the infected pc!
no server to upload your pages on-line antivirus use their own AV is the most recommended

good manual that is all I hope they can use q! whether to copy the entire book or part of it, publish the name of the author

By Raz! the

0 comments:

Post a Comment