08 July, 2024 - 01:11 PM
(01 July, 2024 - 10:21 AM)LVY Wrote: Show Morelet me checkAnonymous RAT setup for New Hackero you ailan, the wain haay of everge cheating As is they has ta conset righ
VPN you say! VEry good. Except that most VPNs do not permit port forwarding of your external IP in a way that can be reliably used for reverse connecting backdoors. So what is an aspiring hacker to do? Get a VPS.
A VPS is a virtual private server. A virtual server rented out that YOU control. You can turn into proxy, a VPN gateway or simply just have it forward RAT connections to your computer. Obviously you will want an off-shore VPS that accepts anonymous payment methods like Bitcoins. You will set the dynamic dns of your RAT slaves to your VPS server, so all your RATs connect to the VPS server, thus only exposing its address and not your home IP.
That way, if LEA comes looking for you, they'll hopefully hit a dead end at your VPS hoster.
The paranoid shield themselves with a VPN while having RAT connections forwarded to them by the VPS. But not everyone has the money....
YOu don't have to be picky about the VPS's features, so long as it can run a barebones linux command line, that should be enough. The magic lies in SSH port forwarding, a seriously underused technique. Now Putty is a nice lightweight SSH client, so let's use that. After connecting to your VPS via SSH, in Putty, open up the menu, and click "change settings". In the window that opens, find the Connections, SSH, Tunnels. We will set up SSH Port Tunneling with the VPS so it forwards connections it receives to your computer inside the encrypted SSH connection. Don't forget to set GatewayPorts to 'yes' in sshd_ config file on your VPS. This configures the SSH daemon on the VPS to bind to the proper interface and forward connections on those ports back to you when you SSH into the box. Without that, you won't be getting any connections.
So, in the Putty options for SSH port forwarding, you want a remote port forward. Source port is whatever your RAT communication port is. Destination port will be localhost: N, where N is your RAT communication port. Click add, then apply. (Note: it is assumed that future versions of Putty will work more or less in this manner. IF confused, just google SSH remote port forward.) For example, if we use port 53, you should see R53 localhost:53 somewhere on that window.
And that's it. Any RAT slaves connecting to your VPS is forwarded to your computer where your client is running, and you can hack away, safely knowing that should any authorities decide to raid "you", they will have come halfway around the world for nothing. I don't know about you, but that sure puts a smile on my face XD.
So in sene pick any ASyou lie and sH port forward. That is pretty much the casiest Spera this eare as far and vile as oy can. Trol any hackers being caught for stupidity
I am keep posting hidden treasure atleast support me
Made with ❤️ for the community
SHOW SOME APPRECIATION FOR MY EFFORTS DONT FORGET TO GIVE IT A LIKE TO THIS POST FOR SUPPORT
BE KIND AND LIKE THE POST + REP AND STAY BLESSED