- Work as a key logger.
- Send any Information from Victim’s PC to the Hacker’s PC.
- Run any program on the Victims PC.
- Display any Violating Image on victim’s Screen.
- Open the CD Drive of the Victim’s PC.
- Open any Web page on the Victims Screen.
- Disable any Specific Key or whole Keyboard.
- Shutdown Victim’s PC.
- Start a Song on the Victim’s PC.etc.etc…………..
Back Orifice
Back Orifice is one of the most common
backdoor programs, and one of the most deadly. The name may seem like a
joke, but sure, the threat is real. Back Orifice was established in Cult
of the Dead Cow group. Back Orifice is an Open Source Program. The main
Threat of this software is that by making some changes in the code
anybody can make it undetectable to the Anti virus Program running on
the Victim’s computer. Apart from the strange title, the program usually
gets port 31337, the reference to “Lit” phenomenon is popular among
hackers.
- Basics Back Orifice consist of 2 main parts. The "client" and the "server".
- The client is the part of Bo2k that you use to control the other party's comp. By defult, it's bo2kgui.exe
- The server is the file you install in the other party's comp in order to control it. By defult, it's bo2k.exe.
- Never ever run bo2k.exe on your own comp unless you know what you are doing.
- Another ipmortant component is plugins. To put it simply, Plugins are addon for Bo2k. They enhance the power of Bo2k.
- For a list of plugins for Bo2k, goto the Bo2k official Site.
- In order to control the other party's comp, you must first sent the bo2k sever to the other party, and once the other party runs it, you just start your bo2k client and using it you can assert your control.
How to use Back Orifice ?
How to use it? First you must configure both the client and the server. First let's configure the server.- Download a copy of Bo2k and unzip it.
- Then run the file bo2kcfg.exe.
- A window will appear welcoming you to the bo2k configuration wizard.
- Click on next (For those experts, they don't use the wizard, they configure it manually.But one thing at a time first.)
- Then the wizard will ask you for the bo2k server file(that's bo2k.exe).
- By defult you just need to click next. However if you rename it or kept it in another folder, go browse for it.
- Now it will ask you if you want TCPIO connection or UDPIO Connection. I would recommand TCPIO.
- Now they will ask you what port you want it to listen to. More popular ones are 6666, 54321, 33137, 31336 and 4444. Try to advoid these. Try putting a number that you can remember easily. Avoid 12345, 1080, 8808.
- Now they will ask you for your encryption type. Usually you get only to choose the XOR option. Do not choose 3DES if you are not in US.
- Now they will ask you what password you want to use.Choose one and remember it.
- Then click finished. The wizard will auto config the Client part for you. Be patient you can use it soon.
- Now sent the server part(bo2k.exe ) to the other party and when the other party runs it, you will be able to connect to it.
What to do when victim clicks on server ?
- Start bo2kgui.exe.
- Click on file, then new server.
- Type what ever name you want to call it.
- Now type the ip address of the other party. If you don't know it,then you are out of luck.
- If the other party is on irc, just goto irc and type /dns and you will get the ip (plz dun include the <> when typing /dns).
- Now click on connect. You should see a window saying "Retriving server capability. Please wait.."
- However if you see "Cannot connect to Remote server" that means the other party either did not run the Bo2k.exe or he is behind a firewall or maybe he has gone offline. Then you are out of luck. :)
- One you have connnect, on the right window you should see some folders. I will explain the functions inside the folder in the next post .
Download Back Orifice 2000
- Back Orifice 2000 can be downloaded at the following address: http://sourceforge.net/projects/bo2k/
How do I delete Back orifice 2000
Removing Back Orifice 2000 may require that you change the registry
settings. To remove it at 7 simple steps, refer to the diagram below.
- Click Start> Run, and type “Regedit”(without the quotes)
- Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
- Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”
- Right-click on this entry and click Remove. Now restart your computer.
- After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
- Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
- Exit Windows Explorer and reboot again.
NOTE : Only for educational purposes and If I got good response on it ,I will furthur explain the functions of folder and also how to add plugins in it.So give your comments if you like it !!!
Subscribe To Get FREE Tutorials!
Respected Readers:
|
7 comments:
thx xeo for your hard work
i have a question :
if the victim restarted his PC or turn it off , when he turn it on back again if i want to use the backdoor he have to open bo2k.exe again or it will run as soon as the PC turn on?
once its installed ..... it will remain active unless the victim deletes the windows .....
how to send this file to sumone? in mail it is detected as virus so cant send it like that, how would u do it?
@Sheharyar u have to manually install it on victim's pc or shorten the link and then send it to user
I'll try this :p
its worth trying bro .... :))
Have used AVG security for a couple of years now, and I would recommend this Anti virus to you all.
Confused? Feel free to ask
Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Post a CommentNote:-
Please do not spam Spam comments will be deleted immediately upon my review.
Regards,
XEO Hacker