-=[ CyberSpy v8.5 Telnet Release Readme ]=-
(c)oded by Ghirai of fearless
PLEASE READ THE DISCLAIMER (Disclaimer.txt) !!!
Language: - 94% Visual Basic 6
Introduction:
-CyberSpy is a trojan (if you don't know what that is, you've got the wrong
software package), and you can use any terminal (telnet, puTTY, whatever.) to connect
to the server.
-Reading the following help files is recommended.
--> To see what changes are in this version, check out the what's new.txt file.
--> To get help with the IRC bot, read the IRC Bot Help.htm file.
--> To get help with the Offline Keylogger, read the
Offline keylogger.htm file.
Why a "telnet" trojan:
-Because it's client independent; wherever you are, whatever OS you're connecting from, there will always be terminal there. Any terminal does the job!Why use puTTY:
-Because it's much easier to use than telnet, and it can display
colors, and that's very useful.
-For example, when you retrieve the keylog file, the windows'
captions are shown in cyan, so it's very easy to find what you're looking
for.
-If you'd use telnet it would be difficult to search for the
windows' caption that interest you (like Yahoo! - Login - Microsoft Internet
Explorer, or Step 5 - Credit Card Information - Microsoft Internet Explorer, etc.)
-You can get puTTY from their official download page:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
Configuring a server:
-Run CSEditor.exe. Click 'Load Server' and select the server. (you can do this
also by passing the server's path as a command line argument).
-One the server is loaded, configure it to fit your needs (every field is
described in the editor's help section; click the '?' icon in the title bar)
-Click 'Save server' or 'Save new server' to update the settings.
-Now get your victim run the server (how? use your imagination). You can and
should rename the server.
Connecting to a victim:
-First of all, if you want to keep track of the victims, use one or all
notification methods (IRC bot, ICQ and Email).
-Once you know the IP/Host name of the victim, fire up a terminal,
and connect to the victim's IP/Host name on the port you specified when you edited the
server (default port is 14194, you should change that).
Commands:
-I'm not listing all the commands/description here. When you're connected, just
type 'help' to get a list of commands.
-They are structured in categories (like files, advanced, fun,
etc.), so you can easily find what you're looking for.
-Type 'help a_command' to get a
description of a_command.
-Here's a short list of the most important commands: browse through victim's HD, view files (text and binary), del files/dirs (wildcards supported), get cached passwords, process manager, get keylogger log file, boot operations, port redirect, run DOS commands and get output, run files.
-There's a total of 61 commands. Here's a screenshot of the result of the "HELP" command. So you see, even if it's a telnet trojan, cyberspy is still easy to use.
Compatibility:
-CyberSpy is compatible with all 32bit Windows OS (9*, Me, NT, 2K, XP), and has
been tested on 98, Me, NT, 2K and XP.
Program Info:
-The Server is ~145K, the editor ~112KB, and both are compressed.
-The server contains mswinsck.ocx (and the keyboard hook dll), so
you don't have to worry about that.
-The server source:
~6000 lines
~600 variables
~80 constants
~110 API declarations
~120 procedures
~80 functions
-The editor source:
~2700 lines
~200 variables
~30 constants
~30 API declarations
~80 procedures
~20 functions
-i just thought you'd like to know...
For lamers/idiots:
-Before you do anything stupid, reading a trojan/backdoor tutorial is advisable.
Last Words:
-The server's file size is around 145KB (depends on the settings), and i can say
that it's very stable, and you don't have to fear that you enter wrong
parameters/commands; it won't crash!
-Are there going to be any next versions?
Probably.
-If you find CyberSpy useful, let me know...
IMPORTANT: Do NOT compress/encrypt or
otherwise tamper with the server/editor!
Greets:
The_Fearless_Programming_Team [ Faceless Wonder, Gobo, mf4, Read101, triforce,
Wisma-Atria ] and Doc of Megasecurity.
Contact:
If you'd like to make any suggestions, send feedback, criticize, whatever, don't hesitate co
contact me.
ghirai@flashmail.com
http://areyoufearless.com
Have fun,
Ghirai.
<EOF>