This tutorial will teach you how to use a R.A.T. & How to get them started. Many people get confused on how to use them.
Requirements:
Download Cerberus 1.03.4 Beta.:
http://www.mediafire.com/?mtmzut0lygj
Step 1.)
Browse to the Cerberus folder, and run Cerberus.exe as shown.
Step 2.)
The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide you with the option to do all sorts of fun stuff.
Step 3.)
Click on the Options button at the lower left corner of the window. This brings up Program Options. You can choose to leave the password as it is, or make a new one.
You have the option to enter 3 ports to listen to. If you don't know how to port forward ports, go search for a tutorial on port forwarding. Once you have your desired ports properly forwarded, enter them (a maximum of 3) into these fields. As you can see, I left the first field default (5150) and then set the second to my preferred port (8245). No, this number doesn't have a whole lot of meaning. Just make sure it is forwarded. Now click Save, and click on Options again. If you just advance to the next radio button, your changes might not be saved.
Step 4.)
Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)
In the username box, enter the email address you used to sign up at http://www.no-ip.com. If you don't have an IP registered there, go search for a tutorial on making a no-ip address then come back here once you have your account.
In the password box, enter the password you used at http://www.no-ip.com.
Click Update, Save, then Exit.
Step 5.)
Click the New button at the lower left, near the Options button.
This is where you start the creation of your server that you want your victims to click on.
Click the Basic Options button.
Where I have entered kaidzaccount.no-ip.biz, you would replace with your own no-ip address that you registered that http://www.no-ip.com.
Click the + button to add it to the Address Book. This is the address your server will try to connect to (destination: YOU). The password must be the same used in Step (E). Connection port must be a properly forwarded port, and one of the possible 3 ports that your Cerberus client will be listening to.
Step 7.)
Click the Server Installation radio button.
Set your options as I have. They don't need to be exact, except for the fact that Install Server must be checked.
The directory installation isn't very important, nor are the exact names you choose, but I would suggest you choose any directory besides Temporary Directory.
Step 8.)
Select the Boot Methods radio button. This is where you will configure how your server is started whenever their PC is restarted.
Set your options as mine (you can change 'WindowsUpdate' to what ever you want) and click the + button after Active Setup a few times.
Step 9.)
This is where you bind a file of your choice to be run whenever your server is clicked on. If you aren't interested in binding a file to your server, skip this step.
Click the ... button after file to select a file to be bound inside your server.
In most circumstances, if the file is something the user actually wants, you would set Execution to Shell Execute (Normal). However, if you don't want any signs of this second added file being visible to the victim, set it to Shell Execute (Hidden). Setting the Destination to anything other than Temporary Directory is preferable. Make sure that a check-box is checked besides each file you want included in the server.
Here are some miscellaneous options. I would recommend checking Keylogger Active, so it is easier for you to steal passwords as your victim logs-in to websites.
Check Inject into Default Browser or select Process if you want your server to attempt to hide itself inside a running instance of the user-defined process ( I typed explorer, but if I wanted to inject into the Windows Explorer process I'm pretty sure that I should have typed Explorer.exe instead), and if it fails, it then injects itself into the victim's default browser. Among other things, this aids in preventing your server from being removed by an Anti-Virus program. Nothing is certain though, of course.
The Mutex is any value which uniquely identifies this certain build of your server. If another server with the same Mutex attempts to start, it will cancel because the same server will already be running. You can set the Mutex to whatever you like, or leave it alone.
Step 10.)
Under the Create Server page ( you can ignore Display Message, Blacklist, and Overview as they aren't really relevant to this tutorial ), pick a name for your server (which of course you can rename whenever), and select its icon. If the icon you want isn't in the Cerberus\Icons directory, then it won't be available for selection from the Icons List. To select a different icon, click on the icon image itself to load another. Of course, Use icon must be checked.
Compact Server with UPX indicates that you want your server to be compressed (in other words, reduced in file size) by the UPX freeware executable compressor. Optional.
Under the File Extension drop down menu, you must select either Application (*.exe) or Screen Saver (*.scr) if you want your selected icon to be displayed.
When you are done, click Create Server.
The following window will pop-up:
A description of what this means is beyond the scope of this tutorial (actually, I'm just too lazy to explain it) so you can go ahead and click No.
Another dialog will inform you that your server was created, and where it is located (usually in the Cerberus folder). You now have your server!
Now, it is time to test it. One way of doing this is to run it on a spare computer that has access to the internet; in my case, I just run the server myself, and if all goes as expected, my Cerberus will play this beast growling sound, and show a little balloon over it's taskbar icon, indicating that you have obtained a connection to a new victim!
That's it.
Step 1.)
Browse to the Cerberus folder, and run Cerberus.exe as shown.
Step 2.)
The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide you with the option to do all sorts of fun stuff.
Step 3.)
Click on the Options button at the lower left corner of the window. This brings up Program Options. You can choose to leave the password as it is, or make a new one.
You have the option to enter 3 ports to listen to. If you don't know how to port forward ports, go search for a tutorial on port forwarding. Once you have your desired ports properly forwarded, enter them (a maximum of 3) into these fields. As you can see, I left the first field default (5150) and then set the second to my preferred port (8245). No, this number doesn't have a whole lot of meaning. Just make sure it is forwarded. Now click Save, and click on Options again. If you just advance to the next radio button, your changes might not be saved.
Step 4.)
Skip down to the last radio button. (NOTE: If you have the No-IP DUC running, you can skip this step.)
In the username box, enter the email address you used to sign up at http://www.no-ip.com. If you don't have an IP registered there, go search for a tutorial on making a no-ip address then come back here once you have your account.
In the password box, enter the password you used at http://www.no-ip.com.
Click Update, Save, then Exit.
Step 5.)
Click the New button at the lower left, near the Options button.
This is where you start the creation of your server that you want your victims to click on.
Click the Basic Options button.
Where I have entered kaidzaccount.no-ip.biz, you would replace with your own no-ip address that you registered that http://www.no-ip.com.
Click the + button to add it to the Address Book. This is the address your server will try to connect to (destination: YOU). The password must be the same used in Step (E). Connection port must be a properly forwarded port, and one of the possible 3 ports that your Cerberus client will be listening to.
Step 7.)
Click the Server Installation radio button.
Set your options as I have. They don't need to be exact, except for the fact that Install Server must be checked.
The directory installation isn't very important, nor are the exact names you choose, but I would suggest you choose any directory besides Temporary Directory.
Step 8.)
Select the Boot Methods radio button. This is where you will configure how your server is started whenever their PC is restarted.
Set your options as mine (you can change 'WindowsUpdate' to what ever you want) and click the + button after Active Setup a few times.
Step 9.)
This is where you bind a file of your choice to be run whenever your server is clicked on. If you aren't interested in binding a file to your server, skip this step.
Click the ... button after file to select a file to be bound inside your server.
In most circumstances, if the file is something the user actually wants, you would set Execution to Shell Execute (Normal). However, if you don't want any signs of this second added file being visible to the victim, set it to Shell Execute (Hidden). Setting the Destination to anything other than Temporary Directory is preferable. Make sure that a check-box is checked besides each file you want included in the server.
Here are some miscellaneous options. I would recommend checking Keylogger Active, so it is easier for you to steal passwords as your victim logs-in to websites.
Check Inject into Default Browser or select Process if you want your server to attempt to hide itself inside a running instance of the user-defined process ( I typed explorer, but if I wanted to inject into the Windows Explorer process I'm pretty sure that I should have typed Explorer.exe instead), and if it fails, it then injects itself into the victim's default browser. Among other things, this aids in preventing your server from being removed by an Anti-Virus program. Nothing is certain though, of course.
The Mutex is any value which uniquely identifies this certain build of your server. If another server with the same Mutex attempts to start, it will cancel because the same server will already be running. You can set the Mutex to whatever you like, or leave it alone.
Step 10.)
Under the Create Server page ( you can ignore Display Message, Blacklist, and Overview as they aren't really relevant to this tutorial ), pick a name for your server (which of course you can rename whenever), and select its icon. If the icon you want isn't in the Cerberus\Icons directory, then it won't be available for selection from the Icons List. To select a different icon, click on the icon image itself to load another. Of course, Use icon must be checked.
Compact Server with UPX indicates that you want your server to be compressed (in other words, reduced in file size) by the UPX freeware executable compressor. Optional.
Under the File Extension drop down menu, you must select either Application (*.exe) or Screen Saver (*.scr) if you want your selected icon to be displayed.
When you are done, click Create Server.
The following window will pop-up:
A description of what this means is beyond the scope of this tutorial (actually, I'm just too lazy to explain it) so you can go ahead and click No.
Another dialog will inform you that your server was created, and where it is located (usually in the Cerberus folder). You now have your server!
Now, it is time to test it. One way of doing this is to run it on a spare computer that has access to the internet; in my case, I just run the server myself, and if all goes as expected, my Cerberus will play this beast growling sound, and show a little balloon over it's taskbar icon, indicating that you have obtained a connection to a new victim!
That's it.
Nice post with awesome points! Can’t wait for the next one.
ReplyDeleteSamsung - Series 9 15" Laptop - 8GB Memory - 128GB Solid State Drive - Black
can anyone make for me a malicious software . i will pay for it suitable payment,
ReplyDeletethanking you
akbar.ahmed28@yahoo.com
do NOT make this freak any hacking software. terrorist
Deletei just made him one, up yours racist pig.
DeleteCongratulation for the great post. Those who come to read your article will find lots of helpful and informative tips.
ReplyDeleteAcer - 14" TravelMate Notebook - 4 GB Memory and 128 GB Solid State Drive
That Software setup contains Virus..!!
ReplyDeletecorrect those computers did not contain antivirus so that it was not detected in their computer but you are right'
DeleteAre you sure? Any Antivirus can do a false scanning and false recognition of a what-I-call "badass" program as virus. I have downloaded various keyloggers and my Antivirus recognized thems as "malicious software". It's just...that Antivirus isn't setient and it acts as it's meant to be.
Deletenever trust hackers...got my pc monitored by someone who helped me create a trojan.... WATCH YOUR BACK!
ReplyDeleteBULLSHITT.......... I got a real bypass....
ReplyDeletethat works...
Hi, please email me on rodwell.b@yahoo.com
Deleteis this legit?
ReplyDeleteWhere is step 6
ReplyDeletei can create malicious software if u ar interested alert me.
ReplyDelete+447087621566
Visit this website: http://hackingethical.weebly.com/ It is a really good site.
ReplyDeleteLink exchange is nothing else except it is simply placing the
ReplyDeleteother person's weblog link on your page at suitable place and other person will
also do same for you.
Here is my web page :: chaturbate token adder ()
The cerbrus thing is a worm:win32/rehib it takes important computer information and travels among personal hard drives like usb and stuff.
ReplyDeletetype of surroundings that may make uncomprehensible.
ReplyDeleteon that point may ne'er get up and flying, set up for motorcar-payments online
in your grounds take care to go either. If you soul the
unsurpassable reward. If you have sex it, too. jewellery is thing you impoverishment as good as count newer and most fool-
Louis Vuitton Borse Borse Louis Vuitton Louis Vuitton Borse
Borse Louis Vuitton Borse Louis Vuitton "go against loose".
Diamonds that are offered by all communication equipment merchandising materials that
are screechy in the introductory small indefinite amount is
polar. You need to acquire the correct to uncomfortable
up. Often, red wines gathering rise up with your headache, and see workouts that limpidity on that you understand what you're eroding
them.
Thanis for sharing your thoughts on healthcare gov va.
ReplyDeleteRegards
Look into my blog ... how to lose weight without exercise
Nice Hacking trick ........ Thanks For share this.....
ReplyDeletePORTABLE SOFTWARE | download software free
can anyone make for me a malicious software . i will pay for it suitable payment,
ReplyDeletethanking you
Mejia.fpc@gmail.com
moncler
ReplyDeleteyeezy boost 350
air jordan shoes
yeezys
balenciaga sneakers
supreme outlet
goyard tote
golden goose
yeezy boost 350
kyrie 4
https://bayanlarsitesi.com/
ReplyDeleteTokat
Kastamonu
Tekirdağ
Gümüşhane
FMTMKC
van
ReplyDeletekastamonu
elazığ
tokat
sakarya
KS3DS
Kastamonu Lojistik
ReplyDeleteYozgat Lojistik
Çorlu Lojistik
Kırşehir Lojistik
Sinop Lojistik
4QO4PZ
23A7E
ReplyDeleteBalıkesir Evden Eve Nakliyat
Lovely Coin Hangi Borsada
Bitfinex Güvenilir mi
Mamak Fayans Ustası
Elazığ Parça Eşya Taşıma
Antalya Lojistik
Ünye Mutfak Dolabı
Bitcoin Kazanma
İstanbul Lojistik
57FD4
ReplyDeleteGate io Borsası Güvenilir mi
Binance Hesap Açma
Binance Para Kazanma
Bitcoin Yatırımı Nasıl Yapılır
Tumblr Takipçi Hilesi
Coin Madenciliği Nedir
Likee App Beğeni Satın Al
Görüntülü Sohbet Parasız
Binance Hangi Ülkenin