0% found this document useful (0 votes)
287 views

How To Use Beast Trojan

The document provides step-by-step instructions for using the Beast Trojan malware to gain unauthorized access to a victim's computer. It describes downloading the Beast software, building a server to generate an infected file, configuring email notifications, disabling the victim's firewall, sending the infected file to the victim, connecting to the victim's machine using their IP address and port, and executing actions on the victim's computer before deleting the server.

Uploaded by

Mujthaba Hassan
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
287 views

How To Use Beast Trojan

The document provides step-by-step instructions for using the Beast Trojan malware to gain unauthorized access to a victim's computer. It describes downloading the Beast software, building a server to generate an infected file, configuring email notifications, disabling the victim's firewall, sending the infected file to the victim, connecting to the victim's machine using their IP address and port, and executing actions on the victim's computer before deleting the server.

Uploaded by

Mujthaba Hassan
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

How to use Beast Trojan Step 1:- Download the necessary software Beast 2.

06 Step 2:- Open the software Step 3:- Now click on Build server button.

Step 4:- Now in this window click on the notifications tab. Step 5:- In the notifications tab click on the e-mail button. Step 6:- Now In this window fill your proper and valid email id Step 7:- Now go to "AV-FW kill tab. Step 8: - Now In this put a tick mark on the Step 9:-Now click on "EXE icon tab. Step 10:- Select any icon and click on the be made. Save Server button and the Trojan will disable XP firewall ".

Step 11:-Now send this Trojan File to victim. Step 12:- As and when the victim will install the Trojan on his system you will get a notification e-mail on your specified e-mail id while making the Trojan. T his Email consists of the IP address and port of the victim. Step 13:-Put This IP address and Port in the place shown in the below snap-shot Step 14:- After That Click on the "Go Beast Button and You will be connected to v ictims PC. Step 15:- Now select the action or task you want to execute on victims PC form t he given list. Step 16:- Now to destroy or kill the Trojan click on the Step 17:-Now click on the Kill Server the victims PC. server tab from the menu.

button and the Trojan will be destroyed from

Step 18:- You are Done Now. Posted 30th May 2011 by [email protected] Labels: Hacking Tools Keylogger and Trojan 2 View comments

You might also like