How to create Remote Access Trojan

CYBERGATE

                                 

A Brief Introduction Of Cybergate - CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed. Using Cybergate you can log the victim's passwords and can also get the screen shots of his computer's screen. You can connect o multiple victims in single time. One should no know what is the ip-address of the victims' computers. That is the main benefit. What you have to do is to spread the server file to the victim’s or the people whom you want to infect. Also there is a file manager utility using which you can explore the data of the victim. So, it’s much exciting, therefore i thought to give a tutorial about it, since it can also be used for constructive purpose i-e you can view the clients of your office or your homies , that what are they doing at computer. Rather they are sincere or not or etc. THIS IS JUST FOR EDUCATIONAL PURPOSE.

***SO, LET’S START THE TUTORIAL--à

BEFORE CREATING TROJAN, PLEASE TURN OFF YOUR ANTIVIRUS BECAUSE IT DETECT CYBERGATE AS A VIRUS.

Step 1:- Download CyberGatev1.07.5 from download link given below




Step 2:-Open up CyberGate.


Step 3:- Now, Click Control Center.


Step 4:- Then Click on StartButton.



Step 5:- Select Listening ports
Step 6:- Choose the default port, i.e., port no. 81and add it. Then set up Connection Password and save it.[Allow Firewall  Access]



*** We have done all the settings needed. Now let’s create our Trojan.

Step 7:- Click Control Center and select Builder and click on Create Server.



Step 8:- Click on Newand add new user name and click on Forwardbutton.



Step 9:- Now select the default DNS and delete it. Then click on Add button and enter your local ip and port 81 and enter the Connection Password which we have setup while setting up the CyberGate.


Step 10:- Then go to installationtab and click on both of the Random button 5-6 times.


Step 11:- Then go to keyloggertab and we have deselected it but if you want keylogger then you can enter your FTP server details to get all keystrokes of the victim.


Step 12:- Then go to Anti Debug tab and uncheck all.


Step 13:- And finally go to Create Servertab and click on Create Server.



You are done!!! Give Your Trojan file to victim and once he click on that file a remote connection will be setup between you and your victim.

NOTE:- Don’t forget to add the port to your firewall. When Cybergate prompt for your firewall then allow it.




Download for offline Reading:




/* you can also use Easy binder to bind your Trojan with some other setup file.
/* It’s just a beginner’s tutorial of CyberGate and You can do a lot more using this.
/* More Advance tutorial will be coming soon…



Previous
Next Post »

1 comments:

Click here for comments
Unknown
admin
24 February 2017 at 18:59 ×

Windows defender block that server. It's not working.

Congrats bro Unknown you got PERTAMAX...! hehehehe...
Reply
avatar