Ok in this thread I will show to the people who don't know how to setup DarkComet RAT v3.0.
I will show how setting up the client and how creating a server with the best settings for run under the most different configurations and ensure there are not compatibility issues with the systems.
Also I provide a package with some extra tools needed in the tuto:
- I coded a very simple runtime crypter to show people how DarkComet can be encrypted without problems with a decent crypter. The detection rate is low only detected by Avira and a-squared. Theorically it can run under x64 systems and of course x86 and under all systems xp/vista/seven.
- I provide a little upx gui tool i found to compress the server and make it size only 250kb without breaking it. The tool is perfect for noobs no command line
-All comes configured and obviously clean and tested
With all of that i only want to show to people how DarkComet can work like charm if its configured correctly and how its perfectly cryptable and the server can be very light.
Download DarkComet RAT v3.0 package
As you notice english is not my first language so dont be a fag and start flaming about this.
Ok after you download the package lets go
After downloading the package i provide extract it and open the folder you will see this content on the folder. Contains the same as de official bundle offered by DarkCoderSC and my crypter, the app to compress the server and the config files of DarkComet. You will notice the DarkComet RAT size is less than the original thats because i compressed it with the compressor when i was testing it.
Execute DarkComet. You will see the main of the program. As you can see the author make good joob with the gui.
The version i provide comes configured so you will ready to use it without troubles. The main part of the client is the general settings were you can configure the appearence of the program and some other accesibility options. One important option here is the password take in mind that if its wrong and its not the same you provided to the server connection attempts wil be refused. I'm sure the main reason of see lot of noobs who start threads regarding darkcomet is because they don't type the correct password and other stupid mistakes like this. Dont be another fag and pay attention to this little things.
In socket list you will see the ports are monitored by the client to establish the desired connections with the servers. As you can see i configured it as by default at port 1604 and with upnp activated. If your router supports upnp port forwarding will do automatically.
What i mean with port forwarding?
To establish connections between the client and the server the port must be open in the router if not the router will refuse all connection attempts and you will look like stupid faggot crying because dont recive any connection and darkcomet its a shit.
I will dont explain here how open the ports on you router(port forwarding) on google there are lot of guides and i don't want to lost more time with it.
To add more listening ports you can do it clicking on listen on the menu or right clicking the listview of the sockets in the socket list tab.
Click in server module and you will see the server builder
Double click to the left column settings-01 and you will show this messagebox that will ensure the settings i configured are loaded over the default settings.
The edit server mode is important to remember if you have in mind to crypt the server. RES mode is compatible with the vast majority of the crypters EOF mode is only compatible with the crypters that support EOF Data like crypters that works with Bifrost.
In password field you need to provide the same password configured in the client if you dont type the same, connections cant be established. The pass i configured with the client is DarkComet.
The mutex is used to avoid to run more than one instance of the server on the same computer to avoid issues.
Here you can configure the ip where the server will connect type your no-ip you have and the port you forwarded correctly and is open and used by the client.
Here you can configure the installation options of the server. The image shows the settings i recommend. Using the app path will ensure your server installs correctly in evrey systems also in systems with limited users privileges. Otherwise the server will fail to install itself and will run on the directory is located. So is and other very important setting to have in mind its not a good scenario run visible on the desktop because it was configured to install itself in system32 and failed because dont have the necessary privileges. The settings i recommend ensure server will be stable and you dont lost connections. Change the name of the process and the folder if you want.
The other options they aren't really important are optional you can decide to bind the file with another or shield even more the server to ensure you dont lost connections but i noticed activating the persistance option of the shield makes the server unkillable even for yourself that you dont be able to uninstall or close the server. Other options like kill some process of windows and other i dont recommend it.
Also you can type a message that will show when the server is executed it can be useful to confuse who executes it and make him believe its corrupt or something like this or evidently you can be a faggot and show to him hes hacked by the supadupa hacker.
You can decide activate the offline keylogger. If you forgot like me to activate me doesnt matter you can activate it later
Final step to get your server you only need to click to the build button and thats all.
You will be askin why we dont compress the server in this step the reason is because seems to dont work very good and dont compress the server as we will compress later that will be reduce a lot the size of the server.
Go to the UPX frontend folder and execute the upxfrontend exe. You will see that window. I think i configured correctly it but if not be sure is configured as in this image of this app will broke your server and will not work. Be sure is configured as in the image. Press start compression and you will see the server is reduced to only 250kbs. Its very small taking in mind the huge functions darkcomet has. Compare it with cybergate that have a lot less functions and the size of the server is the same.
This process cant be maked after crypting the server first the server needs to be packed and then crypted or the server will be broken.
Go to the DarkComet Crypter folder and run the client. Click when it indicated and press encrypt if you selected eof data check the eof data box if not its not needed. After pressing encrypt and if it all worked correctly you will recive this messagebox.
Thats all now you have your server compressed and crypted only 250kb and detected only by avira and a-squared.
And works like a charm
Remember to use DarkComet wisely
Friday, 4 March 2011
// //
0
comments
//
This is my first TuT(Tutorial) tell me how i did and comment to tell me how it went. If you have any questions or need help setting this up send me a PM(private Message). Thanks and Good Luck!
Sites we will use
Download CyberGate Here..
&
http://www.no-ip.com/
The first thing you will need to download is Cybergate. You may use any version you would like v1.07.5, v1.05.1, or v1.04.8. They all set up the same.
To download Cybergate go to and click the tab that says CYBERGATE RAT, after you click that it should pop up a new tab.
On this tab look on the right side and click the tab that says RELEASES, here you can download the version of cybergate you wish to hack with.
After you download Cybergate extract the file, open it but don't go any further.
Next you will need to go to http://www.no-ip.com/ and go to the DOWNLOAD tab. After you click the download tab click Windows and go to the bottom of the page to download DUC 2.2.1 client
After you download DUC 2.2.1 client make an account on no-ip and verify your email. (Remember your info for your account you will need it later)
Once signed on to you verified account go to ADD A HOST, there you will make a hostname. Do not mess with any other settings, just type your hostname and select no-ip.org on the drop down list like so.
After you enter your hostname go to the bottom of the page and click CREAT HOST
Now X(exit) out of everything. We can now create our server on cybergate.
open Cybergate and go to Control Center, Start.
Next go to Control Center, DNS Console.
Here, you need to open No-ip/DUC 2.2.1 client (the download from No-ip) and sign in to it with your info from No-ip.com. after you sign in you will see a smiley face with glasses. uncheck and check the box next to the smile face until he blushes. When he blushes keep it checked and X(exit) no-ip.
Next, fill in the information like i did above then click update until it says Success : DNS Hostname Update Successful . after it says that you can X(exit) the DNS Console Box.
Now you are going to go to Start, Options, Select Listening Ports. Here you will decide which port you will use. it doesn't matter which port you use. you can use anything between 1 and 65535 i usually use 80, 82, or 999. its your choice.
When you choose which port you want to use type it in the top box and click the blue arrow pointing to the left.
After you set a port type in your Connection Password and remember it. i suggest you use the same password as you did on no-ip.
After you choose a port and make a password click Save.
Now you can start creating your server, go to Control Center, Builder, and Create Server.
First create a user, I usually just use 0 because its the easiest. After you make one highlight it with your mouse and click the blue arrow that says Forward.
The next Tab is Connection. highlight the default DNS and Port then delete it and ADD a new one but put your I Pv4 Address:then port your using. if you don't know what your I Pv4 Address is you can go back to DNS Console and auto detect it or go to your start and type cmd, once this is open type ipconfig and it should be right there. it should look something like this 10.0.0.14 but i just put random numbers in there. In the boxes to the right put your user for identification and put the same password you used for your connection.
The next tab is Instillation. Pretty much just copy what you see in this picture but remember to click both the random buttons plenty of times.
The next tab is a message box, this is optional.
The next tab is Key logger, the only thing you need checked is Active key logger and DELETE (Backspace). Those are the only two things to mess with so I'm not going to put a picture.
The next tab is anti-debug, you usually always check all them unless your running your server off anything other then a PC like a VMware Or Sandboxie.
The last tab is Create Server, all you need are Use Icon and Compress With UPX checked on this. After you have all the tabs filled out you can click Create Server and save the virus.
Now run it on your own computer and see if it works!
If it doesn't you didn't do one of my steps correctly but if you send me a PM i will help you fix these problems
Good luck and i hope i helped you out with this TuT!
// //
3
comments
//
What is CyberGate:
CyberGate is a powerful, fully configurable and stable Remote Administration Tool coded in Delphi that is continuously getting developed by our experienced team.What it can do :
CyberGate was built to be a tool for various possible applications, ranging from assisting Users with routine maintenance tasks, to remotely monitoring your Children, captures regular user activities and maintain a backup of your typed data automatically. It can also be used as a monitoring device for detecting unauthorized access.
CyberGate achieves this though it's abundant array of features. A few of which are illustrated below :
CyberGate achieves this though it's abundant array of features. A few of which are illustrated below :
[+] Automatically map ports if your router supports uPnP;
[+] Multi-Threaded : allowing for multiple clients to be connected, along with increased reliability.
[+] Reverse Connection : Some of the listed advantages of a reverse connection -
# Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.
# Since the remote's computer is connecting to the remote administrator, one does not need to know the remote's IP address in order to connect.
# Outgoing connections generally are less treating, and are less likely to be detected or blocked by a firewall, such as a router.
# Since the remote's computer is connecting to the remote administrator, one does not need to know the remote's IP address in order to connect.
# It is much easier to keep track of the computers the RAT is installed on, since they are all "calling home" by connecting to the remote administrator.
[+] User Friendly GUI : The neat and simple GUI of CyberGate make this tool very easy to use and the simplest way to achieve yours goals.
[+] Stealth : The various features of the server installation makes the server extremely customizable accord to each user's needs and requirements.
[+] Keylogger : This tool can be used to find out what is happening on your computer while you are away, maintain a backup of your typed data.
[+] Password recovery : It can be used to recover some of passwords that your forgot long time ago.
[+] Tasks: CyberGate is able to create either tasks for the Client to perform on a specific time after being started or an individual remote whenever it connects back to CyberGate.
[+] Connections tab: You can monitor all the connections and client performance from a connection log that will register actions and time /date for those actions.
[+] File Manager with the ability to download, run, run as administrator, and so many other and the amazing option to see all images of a selected folder as thumbnails;
[+] It can also be used as a monitoring device for detecting unauthorized access.
... and so many other options and features!
How to get CyberGate:
CyberGate comes in two variants, a trial version and a private version distributed to customers only.
Currently with only 1 edition for sale and 3 more editions getting ready for sale in the next few weeks.
Editions:
[+] CyberGate Personal Edition (available)[+] CyberGate Lite Edition (not available)
[+] CyberGate Professional Edition (not available)
[+] CyberGate Premium Edition (not available)
Download....
// //
0
comments
//
Before:

After:

1. Open "%windir%\Explorer.exe" file in Resource Hacker.
2. Go to:
"String Table -> 37 -> 1033 -> 578" (If you are using Luna theme)
"String Table -> 38 -> 1033 -> 595" (If you are using Windows Classic theme)
3. You'll get a string "start". Just change it with whatever text you want to show. Make sure you put quotes.
4. Compile the script and save the file. That's it. You have done.
NOTE: To know more about Resource Hacker, Read Following...
This tutorial will help you in understanding this tool and will teach you how to use it. For your convenience, we have divided this tutorial in 2 parts:
When you open a file in Resource Hacker, it shows various directories in left-side pane, like:

[Viewing Resources]
You can view resource present in the file by expanding the directory given in left-side pane and clicking on the name of the resource. Each resource contains 3 important attributes:
For Icons / Cursors / Bitmaps:
1. First select the resource ( e.g. Bitmap -> 131 -> 1033 ).
2. Now click on Action -> Replace Icon or Cursor or Bitmap....

3. It'll open a new window, click on Open file with new Icon or Cursor or Bitmap button.
4. Select the desired resource using OPEN dialog box, click on Open button and then click on Replace button.
For Other Resources like AVI:
1. Click on Action -> Replace Other Resource....
2. It'll open a new window, click on Open file with new resource button.
3. Select the file and click on Open button.
4. Now you'll need to provide following required information for the resource, which we mentioned earlier:

Resource Type: Mention type of the resource, e.g. if you are replacing AVI file, mention the type as AVI
Resource Name: Provide the same name of the existing resource which you want to replace
Resource Language: Provide language code for the resource, e.g. 1033 for English. You can check existing resource's language code.
5. At last click on Replace button.
[For Menus / Strings / Dialogs]
To change any String, Menu or Dialog box, Select the desired resource, e.g. String Table -> 4 -> 1033, make your changes and at last click on Compile Script button.

It'll immediately compile the script. If you made any mistake while modifying the resource, it'll generate error message so that you can fix it.
Adding New Bitmaps / Icons / Cursors / AVIs:
1. Click on Action -> Add a new Resource....
2. Now click on Open file with new resource button.

3. Select the desired resource and click on Open button.
4. Give Resource Type, Name and Language as mentioned earlier. But keep in mind that Resource Name should not match with any existing resources name.
5. At last click on Add Resource button.
Adding New Menus:
Go to desired menu, e.g. Menu -> 215 -> 1033. Now add a new line anywhere inside POPUP "" using following format:
[Inserting Newly Added Resources in Dialog Boxes]
Once you finish adding new Icons / Bitmaps / AVIs, you can insert them in any dialog box so that you can show in various Windows dialog boxes like RUN, Progress Dialog box, etc.
1. Go to the desired dialog box, e.g. Dialog -> 1020 -> 1033
2. Right-click in the dialog box and select Insert Control option.

3. It'll open a new window. You'll see many controls in the new window, like BITMAP, LABEL, ICON, BUTTON, SysAnimate32 (for AVIs), etc.
4. Click on any desired control, e.g. to insert a Bitmap, click on the BITMAP control or to insert an AVI, click on SysAnimate32 control.

PS: You can also insert Date/Time in dialog box using SysDateTimePick32 control.
5. Don't forget to fill the Caption entry. You need to enter the Resource Name in Caption textbox, e.g. if you have added a Bitmap and set its Resource Name as 401, then give the same 401 in Caption textbox.

PS: For AVI Control ( SysAnimate32 ), you'll need to append # in Caption value, e.g if the AVI name is 144, then put #144 in Caption textbox.
6. At last click on OK button & then Compile the script.
7. If you want to change the position of the new control in dialog box, simply click on the control and drag it to your desired location or you can also use arrow keys to move it.
You can use scripts in 2 ways:
You can use following commands in Command Prompt to perform actions using Resource Hacker:
You can also run a series of commands using script. First you'll need to create the script file using Notepad and then you can run it using following command:
Following is the required format of the script file:
EXE= contains source file name
SaveAs= contains output file name
Log= contains LOG file name which will store a detailed log of the operation
[COMMANDS] section contains the command-set which we want to perform on the source file.
PS: You can omit the LOG= entry in script file. In this case, Resource Hacker will automatically create a LOG file with the name "ResHacker.log".
After:
1. Open "%windir%\Explorer.exe" file in Resource Hacker.
2. Go to:
"String Table -> 37 -> 1033 -> 578" (If you are using Luna theme)
"String Table -> 38 -> 1033 -> 595" (If you are using Windows Classic theme)
3. You'll get a string "start". Just change it with whatever text you want to show. Make sure you put quotes.
4. Compile the script and save the file. That's it. You have done.
NOTE: To know more about Resource Hacker, Read Following...
This tutorial will help you in understanding this tool and will teach you how to use it. For your convenience, we have divided this tutorial in 2 parts:
- PART 1: BASIC INFORMATION
- PART 2: ADVANCED INFORMATION
[Using Resource Hacker]PART1 : BASIC INFORMATION
When you open a file in Resource Hacker, it shows various directories in left-side pane, like:
- AVI - Contains AVI files
- Cursor - Contains Cursor files
- Bitmap - Contains BMP files
- Icon - Contains Icons
- Menu - Contains Menus
- Dialog - Contains Dialog boxes
- String Table - Contains Strings
- Accelerators - Contains Shortcut keys
- Version Info - Contains Version information of the file
[Viewing Resources]
You can view resource present in the file by expanding the directory given in left-side pane and clicking on the name of the resource. Each resource contains 3 important attributes:
- Resource Type
- Resource Name
- Resource Language
For Icons / Cursors / Bitmaps:
1. First select the resource ( e.g. Bitmap -> 131 -> 1033 ).
2. Now click on Action -> Replace Icon or Cursor or Bitmap....
3. It'll open a new window, click on Open file with new Icon or Cursor or Bitmap button.
4. Select the desired resource using OPEN dialog box, click on Open button and then click on Replace button.
For Other Resources like AVI:
1. Click on Action -> Replace Other Resource....
2. It'll open a new window, click on Open file with new resource button.
3. Select the file and click on Open button.
4. Now you'll need to provide following required information for the resource, which we mentioned earlier:
- Resource Type
- Resource Name
- Resource Language
Resource Type: Mention type of the resource, e.g. if you are replacing AVI file, mention the type as AVI
Resource Name: Provide the same name of the existing resource which you want to replace
Resource Language: Provide language code for the resource, e.g. 1033 for English. You can check existing resource's language code.
5. At last click on Replace button.
[For Menus / Strings / Dialogs]
To change any String, Menu or Dialog box, Select the desired resource, e.g. String Table -> 4 -> 1033, make your changes and at last click on Compile Script button.
It'll immediately compile the script. If you made any mistake while modifying the resource, it'll generate error message so that you can fix it.
[Adding New Resources]PART2 : ADVANCED INFORMATION
Adding New Bitmaps / Icons / Cursors / AVIs:
1. Click on Action -> Add a new Resource....
2. Now click on Open file with new resource button.
3. Select the desired resource and click on Open button.
4. Give Resource Type, Name and Language as mentioned earlier. But keep in mind that Resource Name should not match with any existing resources name.
5. At last click on Add Resource button.
Adding New Menus:
Go to desired menu, e.g. Menu -> 215 -> 1033. Now add a new line anywhere inside POPUP "" using following format:
MENUITEM "Custom_String", 12345, MFT_STRING, MFS_GRAYED | MFS_DEFAULTWhere:
- "Custom_String" is the actual text which you want to show in menu.
- 12345 is the identifier. It must be different from existing menuitems.
- MFS_GRAYED disables the menuitem. You can change it to MFS_ENABLED if you want to show your menuitem enabled.
- MFS_DEFAULT shows your menuitem in BOLD. You can omit it.
- You can also add a new attribute in the code MFS_HILITE which automatically selects your menuitem.
MENUITEM "Custom_String", 12345And Resource Hacker will automatically insert other remaining values as mentioned above.
[Inserting Newly Added Resources in Dialog Boxes]
Once you finish adding new Icons / Bitmaps / AVIs, you can insert them in any dialog box so that you can show in various Windows dialog boxes like RUN, Progress Dialog box, etc.
1. Go to the desired dialog box, e.g. Dialog -> 1020 -> 1033
2. Right-click in the dialog box and select Insert Control option.
3. It'll open a new window. You'll see many controls in the new window, like BITMAP, LABEL, ICON, BUTTON, SysAnimate32 (for AVIs), etc.
4. Click on any desired control, e.g. to insert a Bitmap, click on the BITMAP control or to insert an AVI, click on SysAnimate32 control.
PS: You can also insert Date/Time in dialog box using SysDateTimePick32 control.
5. Don't forget to fill the Caption entry. You need to enter the Resource Name in Caption textbox, e.g. if you have added a Bitmap and set its Resource Name as 401, then give the same 401 in Caption textbox.
PS: For AVI Control ( SysAnimate32 ), you'll need to append # in Caption value, e.g if the AVI name is 144, then put #144 in Caption textbox.
6. At last click on OK button & then Compile the script.
7. If you want to change the position of the new control in dialog box, simply click on the control and drag it to your desired location or you can also use arrow keys to move it.
We can also run Resource Hacker using Command Prompt and can use scripts to automate lots of repeatative tasks to save our time.Using Scripts in Resource Hacker
You can use scripts in 2 ways:
- Single Command
- Multiple Commands
You can use following commands in Command Prompt to perform actions using Resource Hacker:
-add ExeFileName, ResultingFileName, ResourceAddress, ResourceType, ResourceName,Where:
-addskip ExeFileName, ResultingFileName, ResourceAddress, ResourceType, ResourceName,
-addoverwrite ExeFileName, ResultingFileName, ResourceAddress, ResourceType, ResourceName,
-modify ExeFileName, ResultingFileName, ResourceAddress, ResourceType, ResourceName,
-extract ExeFileName, ResourceAddress, ResourceType, ResourceName,
-delete ExeFileName, ResultingFileName, ResourceType, ResourceName,
- ExeFileName - Source file name
- ResultingFileName - Output file name
- ResourceAddress - Resource location (e.g. Bitmap path stored in your hard disk)
- ResourceType - Resource type (e.g. Bitmap, AVI, etc.)
- ResourceName - Resource name (e.g. 131, 1020, etc.)
ResHacker.exe -addoverwrite explorer.exe, explorer1.exe, MyImage.bmp , bitmap, 143,[Multiple Commands]
You can also run a series of commands using script. First you'll need to create the script file using Notepad and then you can run it using following command:
ResHacker.exe -script ScriptFileNameWhere, ScriptFileName is the name of the script file which you created in Notepad.
Following is the required format of the script file:
[FILENAMES]Where:
Exe=
SaveAs=
Log=
[COMMANDS]
-addoverwrite ResourceAddress, ResourceType, ResourceName
EXE= contains source file name
SaveAs= contains output file name
Log= contains LOG file name which will store a detailed log of the operation
[COMMANDS] section contains the command-set which we want to perform on the source file.
PS: You can omit the LOG= entry in script file. In this case, Resource Hacker will automatically create a LOG file with the name "ResHacker.log".
// //
0
comments
//



