Friday 8 June 2012

How to setup the Dark Comet 5 for hacking email accounts & PC

Posted By Maher Bro
Dark Comet is a remote administrative tool. It is one of the best and awesome tool for hacking PC.
It is easy to use. It has been great and mostly used for hacking PC’s . Dark Comet is Coded on Delphi XE and Delphi 2007 . It steals the keystrokes and records the desktop. You can even also damage the victim PC by this great efficient tool.
Download the Dark Comet 5 from here .
How to setup the Dark Comet 5 for hacking email accounts & PC
  • After downloading the tool. Open it >Click on Dark Comet Rat> Client Settings> No ip updater
  • Now click on Get a free account. Create an account there. After successfullt creating the account there login into your account. And click on Add host. Now in the Host name provide any name . and click on Create host.
  • Now after creating the host copy your host name in my case it is silent-hacker.no-ip.org .
    Now in your Dark comet Fill the blank fields.
    No ip host :- Your host name ( mine silent-hacker.no-ip.org )
    Username :- Your email address
    Password :- Your password


  • Now it’s time for making the Trojan server. Go to Dark Comet rat>Server module ( 649 kb )>Full editor expert. (  Minimalist is easy to config you can config that your own )
  • Now give any password to your cilents ( it’s optional but id you put the password then also put the same password in the cilents area). Fill server Server ID & Profile name.
  • Next is Network settings In Ip/Dns put your own IP address and in Port any open port of your PC.  ( To check open ports visit canyouseeme.org )
  • Now it’s Module Startup. Your choice what you want to choose.
  • Now it’s Keylogger Cho0se Active Offline Keylogger on server start up ( You can also choose the FTP but from my side choose Offiline keylogger ).
  • Leave host file and plugins Go to file binder Bind any file with your Trojan ( eg. Any song , any document you can use ) and click on add file.
  • Choose any attractive icon for your trojan. It has some inbuilt icons You can use your own icons also.
  • Now it’s final step for Making your trojan ” Stub Finalization “. Choose your method of compression and click on Build the Stub .
So making of the RAT trojan is done to make it fully undetectable ( FUD ) use crypters and changing the file signature. After that Upload you file in any file hosting site www.sendspace.com . and send the download link to the Victim.
Hope you enjoyes the Tutorial and don’t forget to share it :D .

0 comments: