Tuesday, April 26, 2011

Spy Your Friend With HT Employee Monitor

HT Employee Monitor is a software which tracks and records all your employees' computer activities and gives you remote access to this information, including typed keystrokes, visited websites, opened and closed applications, screenshots, and more. The software helps you to increase employee productivity with monitoring, as well as by blocking activities that are not work-related such us instant messengers, installers, specified web content, etc. 

Key features:
Web History
The most important feature in regards to monitored activities is a list of visited websites, which highlights employee activities that are not work-related. The Web History feature records the URLs and page titles of visited websites, as well as timestamps. Even if employees clear their web browser's history it does not hide their viewing of inappropriate internet content. The program is compatible with all versions of the following browsers: Internet Explorer, Firefox, Opera, Chrome, and others.

Keystrokes Recorded
Our employee monitoring software records all typed keystrokes in any application including chat, email, word processing, web browsers and others. The Keystroke History log report includes typed text, title of document, and timestamps. See exactly what employees type on the computer!

Application monitoring
Another feature of our Employee Monitor is the tracking of applications used by employees. It lets you find out if an employee is wasting time at work (e.g. playing solitaire instead of working). The detail log reports will tell you exactly which applications were run and when, and also record application window titles so you can see exactly what your employee was doing.

Screenshot Capturing
Screenshot history provides visualization of employees' activities which can make it obvious just what employees are doing. Employee Monitor captures a full color computer screenshot with customizable intervals and image quality.

Computer Activity
Our employee monitoring software tracks the time a computer was turned on and off. It gives a manager the opportunity to know exactly how much time employees spend at the workplace, and therefore to take measures against truancy and lateness.

Remote Monitoring
It is no longer necessary for managers to manage employees in person. The remote monitoring feature enables viewing of employees' PC activities with just a few mouse clicks via the e-mail delivery of log files. So even when you are far from the office you will know what your employees are doing. Let your employees know that managers and supervisors can see what is happening on their computers in real time even from remote locations — it improves discipline and productivity!

Block Websites / Filter content
Without monitoring employees have the temptation to surf the Internet and waste work time. Our software can help to prevent weak-willed employees from doing this. The Block Websites feature disallows inappropriate Internet content by categories, URLs, or keywords. For example, you can block Facebook.

Block Applications
Games, instant messengers, web browsers, network games, etc. can be big time-wasters. Sometimes a large group of employees plays a network game for hours, and everybody knows about it except the boss. Employee Monitor allows you to block instant messengers, games, and any other programs that managers want to prohibit. For example, you can disable Internet Explorer at all.

Block Installers
Sometimes the most harmful thing to a computer can be a newly installed program. Databases, servers and desktop computers can be crashed by inexperienced PC users who try to install new applications that may contain spyware, adware, or in the worst case, viruses.

Multi-user
The program allows you to monitor and limit every PC user account independent of its rights. It is convenient for managers to create a few user accounts with different sets of rights, and monitor and limit them with our computer monitoring software in different ways.

Invisible mode and password protection
You may want to hide the act of computer monitoring, so HT Employee Monitor can work in a special stealth mode. Only the owner of HT Employee Monitor who knows the special hotkeys can access the program. In addition, to prevent employees accessing and uninstalling the software, you can set a password. The combination of invisible mode and password provides stronger protection. 

Hide Your Identity While Hacking – Hide My IP

Did you know your IP address is exposed every time you visit a website? Your IP address is your online identity and hiding it is the smartest thing you can do to protect your privacy online. You may want to hide your identity just because you want to be anonymous, or maybe because you are doing illegal stuff. Either way here is how to hide your identity online.

Hide My IP masks your true IP address to protect your anonymity while surfing the Web. This application will deliver you several fresh anonymous proxy servers every time you will launch the program.

The main benefit of this software is that you can’t be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection.

Hiding your IP address is as simple as clicking the “Hide My IP” button, which installs a “fake ip” in your favorite web browser including Internet Explorer, Firefox, Google Chrome, Safari, Opera, Netscape, and many more! When you close Hide My IP, your Internet settings will revert back to normal.

Hide My IP Top Features:

Anonymous Web Surfing

Prevent others from seeing your true IP when browsing the Internet. Change your IP frequently with the click of a button!

Protect Your Identity

Identity thieves can use your IP address to monitor your web activity and intercept your private financial information. Criminals, hackers, and even the government can trace your exact location right down to your street address.

Encrypt Your Internet Connection

Prevent your Internet Service Provider or hackers on wireless networks sniffing your web browsing traffic by using the “Encrypt My Connection” feature, which creates a secure 128-bit encrypted link between your computer and your hidden IP.

Send Anonymous E-mails

Prevent your real IP address from being shown in E-mail headers on any Webmail E-mail service such as Yahoo, Hotmail, or Gmail. It is very for anyone to find your geographic area you send E-mail from using free publicly available IP lookup tools.

Un-ban Yourself From Forums and Message Boards

Have you been banned from a forum or message board? No problem! Use Hide My IP to change your IP and clear your browser cookies, allowing you to access any website that has banned you such as eBay, Craigslist, and many browser-based games.

How It Works

When you browse the Internet normally, your computer makes a direct connection to the websites you visit. With Hide My IP running, an anonymous proxy server is set to relay information between you and the websites you visit, hence web sites see the fake relay IP and not your real IP address.
Where are these fake IP addresses located? Hide My IP selects a random IP from a list of hundreds of anonymous fake IPs from all over the world. The chosen IP is then automatically installed into your web browser, e-mail client, game, or other application you specify Hide My IP to work with, allowing you to surf the Internet and use Internet-based software while remaining totally anonymous.


Control Your Computer with Your Cell Phone.

Remotely Control Your PC from Anywhere with Your Cell Phone!

Have you ever been away from your desktop and needed some information that was on it? Have you ever needed to shutdown your computer or do something underhanded while away? In this post I am going to show you how to control your PC from your Cell Phone.

There is a program called CellPC that allows you to perform operations on your home/work PC via your cell phone or wireless device quickly and easily. Imagine being able to shutdown, restart, or logoff your PC remotely... search files on your computer and then send them to your cell phone... view a realtime screenshot of your computer at anytime... lockdown your computer... send a message/note/reminder to your computer... and much more!

CellPC Top Features:

    Perform Shutdowns, Restarts, Logoffs
    View a Screenshot of your Computer
    Search for and Retrieve Files
    View and Close Open Windows
    Customizable Commands Editing
    Be Alerted when your Computer is Used View and Close Open 
    Applications
    Send Messages to your Computer
    Lock and Unlock your Computer
    Secure Command Execution
    Log all Access Attempts and Commands
    Disable/Enable Commands at will



How does CellPC Work? 
 Will CellPC Work for Me?

CellPC can work with any Windows computer as long as it has a steady internet connection while the software is running.

If you want to verify that CellPC will work with your device, contact the CellPC support team so you can send them a test message from your phone.

Remote Spy Software - Monitor any PC from Anywhere

Before monitoring software can record activity, it must be installed onto the computer it's going to monitor. In most cases, you have access to your computer and can simply walk up to it and install the program. But in some cases, you can't get to your remote computer to install the software such as a distant employee PC.
Realtime-Spy is a remote spy software solution that requires no physical installation, and is the first product to allow you to truly view activity logs from any location at any time!

It is the latest in high-tech surveillance and remote spy software that allows you to remotely install the monitoring system on any computer you own and access the activity logs from anywhere at any time via your own personal Realtime-Spy Webspace! No remembering long IP addresses or directly connecting to the remote PC - all you have to do is point your browser to your personal webspace address to view logs from any machines you deploy Realtime-Spy on! Realtime-Spy can log and record anything a user does on your computer, as well as display, in real-time, what users are doing and typing.

Realtime-Spy Top Features:
How Realtime-Spy Works

RealtimeSpy provides a remotely installable spy software without the use of IP addresses or direct connections to the PC(s) you are monitoring. View the image below for more information.



Once installed on the computer you wish to monitor, RealtimeSpy will connect to the RealtimeSpy Server to send all activity logs of the computer in real-time. If the computer is offline then it will queue (hold) the logs till the next time it is online. The entire transfer process is done silently and no notifications are given during the process.





 

Bypassing Firewall using Httptunnel.

Httptunnel creates a bidirectional virtual data path tunneled in HTTP requests. The requests can be sent via an HTTP proxy if so desired. This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and telnet or PPP to connect to a computer outside the firewall.


Here is how htc sends data to the destination:
  1. Open TCP connection to hts
  2. Send HTTP POST with a large Content-Length
  3. Send TUNNEL_DATA packets until POST Content-Length would be exceeded.
  4. Send TUNNEL_PADDING packets to exactly satisfy Content-Length - 1
  5. Send TUNNEL_DISCONNECT (1 byte)
  6. Close TCP connection
  7. Go to step 1

Here is how htc gets data from the destination.
  1. Open TCP connection to hts
  2. Send HTTP GET
  3. Wait for response from hts
  4. Read TUNNEL_DATA, then TUNNEL_PADDING, TUNNEL_DISCONNECT packets
  5. Close TCP connection
  6. Go to step 1
Tunnel creation and destruction


This can be useful for users behind restrictive firewalls. If WWW access is allowed through a HTTP proxy, it's possible to use httptunnel and, say, telnet or PPP to connect to a computer outside the firewall.

How to download complete websites and save on Pc.

When you discover an interesting website and want to copy a complete website to view it locally without internet connection. If in hurry, you can backup entire website on USB drive and view it afterward. Can be useful even if you want to save thousands of images from a webpage in one click.

HTTrack is a tool to save all the webpages from a specified website. The website downloaded when viewed offline looks exactly as it appears online. An exact mirror of the website is downloaded on your HardDisk with all the styles, background images and alignments keeping intact. The links pointing out of the page are also taken into consideration means those pages are also downloaded. For example: You have to download all the MP3 songs, Flash, videos or only some of them using Filters from a website all at once then WinHTTrack is a feasible option.

The sites downloaded can be used in your regular browser and there are no waiting times to load another page as all the pages are already stored offline in your Local Disk. Moreover, no active Internet connection required to access it. Personally, I used it to show  research pages of my Project to the concerned professor where internet connectivity was poor.

How to download complete website?

Enter Project name and Category (It can be anything according to the site you are downloading). Next the Base Path where the site will be downloaded.
More than one URL can be entered to be downloaded. Specify them in the box. You can specify filters to download specific extension of files like MP3, JPG or PNG from Set Options buttons.


Then Press Finish to start copying. You can prefer to shutdown PC after downloading is completed  as it may take few minutes depending upon the size of files hosted on site.
Now, to view the downloaded website go to the output folder and click on index.html file (general name) or open the HTTrack Website copier program and click Browse Sites from File menu.

Download HTTrack 


Folder Lock Without Any Software

Folder Lock With Password Without Any Software-
Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').
Any name will do.
Then you see a batch file. Double click on this batch file to create a folder locker.
New folder named 'Locker' would be formed at the same location.
Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'.
If you want to unlock your files,double click the batch file again and you would be prompted for password.
Enter the password and enjoy access to the folder.


if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

No name FOLDER.

This trick will allow you to create files and folders without any name.

Just follow the steps as given below :-

1) Select any file or folder.

2) Right click on it, select 'Rename' or simply press 'F2'.

3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.

Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.
Don’t type the numbers which are present on top of the character keys.

4) Press Enter and the nameless file or folder will be created.

Reason :- The file or folder that seems nameless is actually named with a single space.



But what if you want to create another nameless file or folder in the same directory ?
For this you will have to rename the file with 2 spaces.
Just follow the steps given below :-

1) Select file, Press 'F2'.

2) Hold 'Alt' key and type '0160' from the numpad.

3) Release the 'Alt' key. Now without doing anything else, again hold 'Alt' key and type '0160'.

4) Press 'Enter' and you will have second nameless file in the same directory.

5) Repeat step 3 to create as many nameless files or folders in the same directory.

If u having a problem with deleting these NO NAME FOLDER, just restart your PC in 'Safe Mode' and delete it 4m there. OK

Hide exe file in JPJ.

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.

Chat in command prompt(cmd).

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:
7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:
8) Now all you need to do is type your message and press Enter.
Start Chatting>>>>>.........

Network Hacking.

Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com

Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n

Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.google.com

Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.

Run Multiple Google Talk.

Users of Google Talk (GTalk) can also let GTalk go to polygamy, that’s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be done without any crack, patch or hack, with just a simple command line parameter or switch /nomutex appended to the Google Talk shortcut.

Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don’t want to log on and off from one account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

You can add the /nomutex switch or parameter to existing Google Talk shortcut, or create a new shortcut with the /nomutex command line parameter.

To edit existing Google Talk shortcut:

1) Right click on the Google Talk shortcut.
2) On the right click contextual menu, click on Properties.
3) Go to Shortcut tab on Google Talk Properties window.
4) On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).

Target: "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex

5) Click on OK.


To create a new shortcut for Google Talk:

1) Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2) Select New on the right click context menu.
3) Then select Shortcut.
4) Copy and paste the following line to the text box when prompted to type the location of the item:

“C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex

5) Click on Next.
6) Give the shortcut a proper name such as Google Talk or Google Talk Multiple or Google Talk Polygamy.
7) Click OK until you are done.

If you have hex editor, you can act like a hacker and modify the bits in Google Talk program so that it will always allow multiple instances of GTalk to be launched whether the /nomutex switch is specified or not.

Launch hex editor and open googletalk.exe, then search for the following patterns in the hex editor:

004536FD . 3BC6 CMP EAX,ESI
004536FF . 75 05 JNZ SHORT googleta.00453706

Modify the string to look like the following:

004536FD . 8BC1 MOV EAX,ECX
004536FF . EB 05 JMP SHORT googleta.00453706

Ask further queries trickhack@ymail.com

How to hack WEP keys with backtrack 3.

Hack WEP keys In Window using backtrack.

The BackTrack distribution originated from the Linux counterparts WHAX and Max Moser's Auditor Security Collection - "The Swiss Army Knife for security assessments"

Monday, April 25, 2011

Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack

How to Hack Gmail Account Password



METHOD-1: How to Hack Gmail Account Passwords Using Phishing Attack

Step 1: Download Gmail fake login page and extract the contents into a folder. Visit here to download GMAIL FAKE PAGE

Step 2: Create your free account at www.t35.com, www.110mb.com or www.ripway.com and upload the extract files here.

Step 3: I have uploaded all files at t35.com. Simply upload all the extracted files here.

Step 4: Open you fake page, enter user name and password and try out whether its working. You fake page will be located at http://yoursitename.t35.com/Gmail.htm


Step 5: A password file will be created in the same directory and you can check it at http://yoursitename.t35.com/GmailPasswords.htm.

Now you are ready to hack Gmail accounts password.
METHOD-2: How to Hack Gmail Account Passwords Using Trojans & Keyloggers
Here I am demonstrating using PRORAT trojan. You can also check the list of trojans & Keyloggers here which I have already posted few months back. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. I strictly recommend you to try these trojans & keyloggers on some testing system first.





Step-1: Download latest version of ProRat v1.9 Fix2. CLICK HERE to download. The ZipPass is : pro


STEP-2: Creating the ProRat server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

STEP-3: Open Notifications. Select second option "Mail Notification". In the E-MAIL field you will see a mail
id: bomberman@yahoo.com. Remove this mail ID and give your own mail id here. You will receive a notification
email on this email id whenever you victim will be connected to internet from the infected system.

STEP-4: Open General settings. This tab is the most important tab. In the check boxes. here is a quick overview
of what they mean and which should be checked.

Key:

[ ] = dont check
[x] = check

[ ] Give a Fake Error Message. (when they open the file, it gives an error message.
[x] Melt server on install. (this will cause the server to ALWAYS connect to the internet when the victim gets
online)
[x] Kill AV - FW on Install. (this causes the anti-virus and firewalls to SHUT DOWN and stay off once installed
on the victim's computer.
[x] Disable Windows XP SP2 security center
[x] Disable Windows XP Firewall
[x] Clear Windows XP Restore Points
[ ] Dont send LAN notifications ( keeps other computers on the victim's network from knowing about you )
[ ] Protection for removing local server

In the Invisibility Box, check all 4 boxes.

STEP-5: Open Bind With File. You can bind your server\downloader server with a file that you want. You must
click on the ''Bind the server with a file'' button and then the file button will be activated. You can choose
a file to be binded with the server now. A good suggestion is a picture because that is a small file and its
easer to send to the people you need.

STEP-6: Open Server Extensions. I prefer using .exe files, because it is cryptable. Mostly crypters don't
support .bat/.pif/.com etc. So use .exe files.

STEP-7: Open Server Icon. You can select the one you want to use with the server from the small pictures on the
menu. You can use an icon from your computer also. Press the "Choose new icon" button.

STEP-8: After this, press "Create server", your server will be in the same folder as ProRat. A new file with
name "binded_server" will be created. Rename this file to something describing the picture.

[NOTE: PLS DO NOT OPEN THE FILE "binded_server" on your system.]

STEP-9: Sending this file "binded_server" to victim. You can send this trojan server via email, pendrive or if
you have physical access to the system, go and run the file.

From EMAIL, you can not send this file as it is because it will be detected as TROJAN OR VIRUS. Password protect this file with
ZIP and then email it. Once your victime download this ZIP file, ask him to unlock it using ZIP password. When
the victim will double click on the file, he will be in your control.

STEP-10: Connecting to the victim's computer. Once the server has been sent and the person has opened this ZIP
folder, they will now be infected with it. AND HAVE NO CLUE ABOUT IT!. On the top of the ProRat program you
will see a box in the upper left corner. Type in the victim's IP address and make sure the port is 5110. Now
press Connect. You should now see a pop-up box wanting to know a password. Remember the password you entered
while creating the server? that is what you need to type. By default, it is "123456" without quotes.

STEP-11: Check your email, (junk in needed), and find the “Your victim is online”. Copy and paste the IP
address onto ProRat where it says “IP:[127.0.0.1]“. Press CONNECT, DO NOT CHANGE THE PORT, if u did change it
back to 5110. Type in the password (default is usually 123456, it is in the email). Your done, now you can mess
with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will
make the computer useless.

How to find IP address of the senders of Emails

Finding IP Address Of the Sender In Hotmail!!

* Log into your Hotmail account with your username and password.
* Click on the Mail tab on the top.
* Open the mail.
* If you do not see the headers above the mail message, your headers are not displayed . To display the headers, follow these steps:

* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked.
* Click on Ok button
* Go back to the mails and open that mail.

* If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
* Hotmail headers : Daniel ,In this case the IP address of the sender is [68.34.60.59]. This is be the IP address of the sender.
* If you find a header with Received: from followed by a Gmail proxy like this
* Hotmail headers : Daniel
* Look for Received: from followed by IP address within square brackets[]. In this case, the IP address of the sender is [69.140.7.58].
* Or else if you have headers like this
* Hotmail headers : Daniel
* Look for Received: from followed by IP address within square brackets[].
* In this case, the IP address of the sender is [61.83.145.129] .
* If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.

Finding IP Address of the sender in Yahoo Mail!!

* Log into your Yahoo! mail with your username and password.
* Click on Inbox or whichever folder you have stored your mail.
* Open the mail.
* If you do not see the headers above the mail message, your headers are not displayed . To display the headers,
* Click on Options on the top-right corner
* In the Mail Options page, click on General Preferences
* Scroll down to Messages where you have the Headers option
* Make sure that Show all headers on incoming messages is selected
* Click on the Save button
* Go back to the mails and open that mail.
* You should see similar headers like this:
* Yahoo! headers : Daniel.
* Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109
* That is be the IP address of the sender!

Finding IP Address of the sender in Gmail !!

When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.

* Log into your Gmail account with your username and password.
* Open the mail.
* To display the headers,

>> Click on More options corresponding to that thread. You should get a bunch of links. Click on Show original

* You should get headers like this:

>> Gmail headers : Daniel

* Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 65.119.112.245.
* That is be the IP address of the sender!!

NOTE:=
This will not work if the sender uses anonymous proxy servers.