tailieunhanh - Guide to Hacking with sub7

Guide to Hacking with sub7 By Ølîprõ Customising your trojan: 1. Well first you need a victim so ICQ would be a brilliant place to start, considering you can get a program that’ll give you that victim’s if you can’t get the scanner on sub7 to work. | Guide to Hacking with sub7 By 0lipro Customising your trojan 1. Well first you need a victim so ICQ would be a brilliant place to start considering you can get a program that ll give you that victim s if you can t get the scanner on sub7 to work. However they need to be on your list to get their a good program would be wonder ICQ me get it at http after you ve logged their you need to customise your virus 2. Here is a screen shot f edit server 1st screen In the port field choose a number between 0001 - 9999 just for ease of memory and note that then give the victim a name. Enter a protect password if you don t want anyone else to be able to hack them don t enter a password in the 3rd box because the victim will have to enter a password to let the virus work oh and give the server a innocent sounding filename like win update. Now to start-up methods This is quite easy just select 1 or more start-up methods choose all if you want it difficult to remove here. Now onto notifications get an ICQ account and get it to tell you like that it is most reliable and gives u their too which means you don t need to get their via a tool but I prefer to in case the notify doesn t work. Now binded files this just lets you make files get run or extracted to make it look genuine so if you said it s a pic then add a pic you get the idea. Plugins is just the .dll files you integrate with server so you can play with their PC they ll be in the folder you extracted sub7 to I recommend fun1 and 2 plus advanced and ICQpwsteal all of them if you think the victim won t get suspicious of the size. I won t bother with restrictions because that s just to limit your fun so leave that alone. e-mail let s you be notified of the victims keypresses via e-mail and passwords that is recorded and aim msn ICQ etc. now the final touches If you didn t put any files in with it the fake error message is perfect don t forget to configure it I recommend you don t bother .