seams a little too long,but professional enough,will have a check after getting back my account ,he is currently be pled
![]()
POISON IVY
Poison Ivy is a RAT, a remote administration tool. Which means that you use it to control yours or other computers.I don't even know if anyone will find this useful, but I'm writing it out anyway - I'm bored. Sorry if you find it too simple(insulting). Or too hard.
IN THIS GUIDE I'M PROMOTING IT FOR LEGAL USE.
Things you'll need to do:
Download Poison Ivy (Provided in post)
Client Computer and a Server Computer
Port forward the port you are going to use if behind a router.
(Additionally, "Armadillo SoftwarePassport" is helpful, but it costs 300$.)
http://rapidshare.com/files/162501897/PI2.3.2.rar.html
Now, download Poison Ivy with the above link if you havent't already.(It's NOT a virus). When you open it up it should look like this:
Click on new server.
Click on new profile. Name it whatever you want.
1. Click on add. The address is currently set to your local IP.
2. Change the IP to another machines on your networks6):, and specify a port of your choice. I usually just use a port between 7001-7008. You'll need to portforward this port, and also remember it for later(or just check back for it later)
3. Click ok.
4. Assign an ID. Whatever you want it to be named.
5. Assign a group to the ID. Again, whatever you want it to be named.
6. Assign a password - this is important, remember it.
7. Click next.
1. Check the box, and click random. Nothing else.
2. Check copy file, check either windows or the system folder. Name it something that ends with .exe
3. Melt would make it dissapear upon execution, since this guide is for legal use, I don't see any use for it6):. Check keylogger if you want. You won't need persistence.
4. Click next.
Don't mess with these settings. Unless you know what you're doing, they're fine as they are. Except the Inject option. You can specify another process if you want. If not, it will inject into the default browser. Click next.
1. Click generate.
2. Name it and save it.
3. Click ok.
4. Click new client(back at the main menu again)
1. Specify the port from before.
2. Same password as you set before, no need to check the box above.
3. Click start.
You should now have the screen above. Execute the .exe file at your computer of choice(your own ones)6):, and you will get access to it trough this menu. This is for example, is great for controlling your home computer from work. The server file is classified as a trojan, don't be alarmed by this.
Armadillo/SoftwarePassport (OPTIONAL)
Armadillo is a packer and encrypting tool. The server file for poison ivy will show up in almost all virus scan as a virus. Armadillo will greatly reduce the number of antiviruses capable of detecting it. However all antiviruses having real-time protection still stands a chance of stopping connection attempts etc. But Armadillo is great for removing that annoying auto-deletion of the server because something thinks it is a virus. It makes most programs nearly undetectable.
You'll need to do the portforwarding bit yourself. I hope this helps the few of you here that wanted more help setting up a 'trojan' as i described in my earlier thread.
seams a little too long,but professional enough,will have a check after getting back my account ,he is currently be pled
![]()
Any questions regarding this feel free to ask. Ill help with Poison Ivy as it isnt 0-day. This is a very very good RAT. If you can manage to infect someone with this their whole computer becomes your playground.
I've messed with RATs before. They're very, very fun, especially when you get multiple friends to connect to a server (the server being on some poor sap's computer).
Link to my guide: https://www.mmowned.com/forums/wow-g...rd-policy.html | I'm retired, please don't PM me. Thanks.
Love RATs, I use them to commit my crimes.
forget proxies.
Last edited by Purple Sprite; 11-10-2008 at 09:12 PM.
SO rats can actually be used instead of proxies? on someones computer? what if they turn on the computer? and see what your doing.. wouldnt that make them pissed?
RAT's Are HIGHLY Detectable Now A Days, Any Person Could detect them easily, Unless your Pro like me
My RAT:
First of all..it does not matter what RAT you are using.. All that matters is how you pack the server. I am offering this to everyone that wants to get into the 'scene'. The 'scene' sucks ass btw and isnt worth getting into.
To be 100% honest you can't do shit with this stuff without 0-day access OR the ability to program your own shit. Poison Ivy is insane nice when you have access.
I won't be adding anymore info from now on because everything i give is either shot down OR someone can do it better. Thank mmowned.com community for everything but after all the asking for more info VIA pm and then i GIVE more info nobody likes it i am done. you guys are great but when you wanna grow up and stop scamming and actually start cracking let me know.
You can get a kit now, once from a few undeground hacking community's i use to use that completely wipe's any change of AVG Free or any other mainstream Virus Scanner/Malware Cleaner Online or Offline from finding it.
Il have a look around and make a post soon, so keep looking.
And good effort on post mate, keep it up.
PIGMAN
Thanks. but i don't think i am going to keep it up. I tried to provide everyone here with ways to keylog/trojan a victim. If you seen some of the PM's i get you would be disgusted. 30% of this community is awesome the rest are just leecher's that dunno how to use google.
Question, what do you mean when you say 0-day shit? :S
Sorry, had to ask lol
Oh, and file needs to be re-upped![]()
... First of all, this is the WOW Scamming section of a site that is primarily based towards exploiting a GAME.
There are thousands of people that come here (mostly kids) just to "cheat" in Wow. The scams section has become quite popular here, because a lot of kids just seem to gravitate towards "free stuff" or "uber accounts", etc.
You can't post some random remote admin program and then get pissed when all the 13yr olds start spam PM'ing you about how to use it to keylog someone. If your seriously going to jump right out and whine because of that, your the one that needs to grow up.
Post good stuff, explain how to use it in the context the people here would like to use it, and then answer as many questions as possible, because most of the people here have no idea how to do most of this stuff. Then youd be able to get the Rep to come post the good stuff in the Contrib forums where it would be appreciated.
PS: This should be in the programs section. Its not a scam post unless you explain ways to get it to someone, for a specific purpose.
You even said yourself that almost all anti-virus is capable of detecting it, either at first, or in real-time afterwards. Making it worthless for the people here.
Last edited by Gritts; 11-20-2008 at 08:38 PM.