How to setup the Dark Comet 5 for hacking email accounts & PC
Dark Comet is a remote administrative tool. It is one of the best and awesome tool for hacking PC.
It is easy to use. It has been great and mostly used for hacking PC’s . Dark Comet is Coded on Delphi XE and Delphi 2007 . It steals the keystrokes and records the desktop. You can even also damage the victim PC by this great efficient tool.
Download the Dark Comet 5 from here .
It is easy to use. It has been great and mostly used for hacking PC’s . Dark Comet is Coded on Delphi XE and Delphi 2007 . It steals the keystrokes and records the desktop. You can even also damage the victim PC by this great efficient tool.
Download the Dark Comet 5 from here .
How to setup the Dark Comet 5 for hacking email accounts & PC
- After downloading the tool. Open it >Click on Dark Comet Rat> Client Settings> No ip updater
- Now click on Get a free account. Create an account there. After successfullt creating the account there login into your account. And click on Add host. Now in the Host name provide any name . and click on Create host.
- Now after creating the host copy your host name in my case it is silent-hacker.no-ip.org .
Now in your Dark comet Fill the blank fields.
No ip host :- Your host name ( mine silent-hacker.no-ip.org )
Username :- Your email address
Password :- Your password
- Now it’s time for making the Trojan server. Go to Dark Comet rat>Server module ( 649 kb )>Full editor expert. ( Minimalist is easy to config you can config that your own )
- Now give any password to your cilents ( it’s optional but id you put the password then also put the same password in the cilents area). Fill server Server ID & Profile name.
- Next is Network settings In Ip/Dns put your own IP address and in Port any open port of your PC. ( To check open ports visit canyouseeme.org )
- Now it’s Module Startup. Your choice what you want to choose.
- Now it’s Keylogger Cho0se Active Offline Keylogger on server start up ( You can also choose the FTP but from my side choose Offiline keylogger ).
- Leave host file and plugins Go to file binder Bind any file with your Trojan ( eg. Any song , any document you can use ) and click on add file.
- Choose any attractive icon for your trojan. It has some inbuilt icons You can use your own icons also.
- Now it’s final step for Making your trojan ” Stub Finalization “. Choose your method of compression and click on Build the Stub .
0 comments:
Post a Comment