If you don't have a file listed here then re-download PEST but first clear your history. You do this by going to start,programs,Internet Explorer. Then once Internet Explorer is up click on Tools. Then click Internet Options.... Once a new window pops up look for Clear History. After you've found it click it. Now just wait for a while until your cursor is back to normal. Then re-download PEST. If you still don't have some of the files contact: monkey@monkeycircus.cjb.net and tell him the files missing..
Okay now once we have checked all the files and made sure they are all there, we need to go over all the files and check what they are. okay.
Edtsrv-This edits the server that your going to infect the victim with (NOTE: only the standard 'server.exe' is editable. The windows XP server is not editable, because it is compressed and binded with other files).
Portscan-Is a port scanner.
Windows XP Server-(non-editble) and is XP compatible. If you dont know what Os the victim uses, then use the standard server.exe
Server-This is what receives command's from the client and you infect your victim with it.
Help-This is the help file.
Okay now we know what everything is we open Edtsrv! Now open it. Okay now look for a folder looking icon in the window once you've found it click it then find unpacked server.exe and select it. Now press open. Okay. Now click on Read server settings. Okay we have opened up the server.exe in the server editor now lets look at the variables.
Enable ICQ Notify
UIN
Server Port
Server Filename
RegistryKeyname
Upload/Download Port
Install Directory
Okay now lets learn what they are and what they do.
Enable ICQ Notify-Tells you when your victim is on.
UIN-This is your ICQ number (required if Enable ICG Notify Is On)
Server Port-This is the main port that the server is on. Example: 901 (Required to connect)
Server Filename-The name of the server after its installed on the victims computer, don't make it easy to guess its a Trojan like: Trojan.exe lol use like mshtml.exe ;-)
Registry Keyname-This is the name of the Start up key in the registry.
Upload/Download Port-This is the port so you can view,delete,upload,download files on the victims computer. Example: 902
Install Directory-This is the place where the server is installed after it is opened. System directory is: C:\WINDOWS\SYSTEM\ Windows directory is: C:\WINDOWS\ I would use system.
Okay Now Fill Out The Server Settings After Your Done Click On Save new settings. Good the server is done! Now you need a victim to infect. This is the hard and yet fun part. The thing to do is go into a chartroom and PIC a person but make sure they are not a not a guy unless they are like 11, but mostly PIC girls cause most of them don't have computer smarts and think an exe is a bmp,ha,lol. Now girls out there if you've gotten this far and gotten every bit IM impressed! Now just act nice and friendly (Keyword: ACT!). Then you strike the conversation (Do you have a picture?). Then if they ask if you have one say yes! Next change the server name to: yourname PIC. Example: Glenn Pic.exe. Now send it to the victim. Then if they say theirs noting in there!?!? Say okay sorry and tell them to goto Start, Run and type winipcfg. Next say look for a box with words in it, then tell them to select all of them until something appears in the IP box, it will have IP next to it :-). Now tell them to give it to you so you can make it work. Okay now if you've gotten this far with no errors, then you've got a great victim! Okay now if you got their IP ditch them or just talk to them but make sure your on MSN or yahoo because on AOL you can get notified and get busted! Okay now on to connecting, open PEST v3-2 and look for the IP box and type their IP. Then look for the Server Port and put what you made the server port when editing the server settings. Okay now look for Upload/Download Port and put the Upload/Download Server Port you made while editing the server. Now click on connect. Tada your not in then goback and reread how to do this. Or maybe the victim is smart and sent you a fake IP. Maybe, nahh. Just go back and reread how to do this here is a list of what to do and you can check it off.
Edit Server With Edtsrv
Pull a victim from a chat room.
Ask if they have a picture.
Send the victim the server but rename after you. example:
Glenn pic.exe
Tell the victim to give you their IP address
Open PEST v3-2 and input all the connection values.
Press connect.
Yeppie you've connected and hacked your first victim! I hope this was helpfull to you.
Auto Scroll - Scrolls the text down when a new text line is displayed.
Enable - Enables Keylogger (tracks the keys pressed by the victim).
Disable - Disable Keylogger.
Clear - Clears the text you have gotten so far.
Save As... - Saves the text to a file.
Remote Printer Manager
Bold - Prints the text bold.
Italic - Prints the text italic.
Underline - Prints the text underlined.
Strike - Prints the text striked out.
Font Size - Prints the font size as big as you put.
Print Text - Prints the text you just made on the victims printer.
Get Remote Passwords
Get RAS pwds - Get stored passwords on the victims computer (stored
passwords) Get cache pwds - Get saved passwords on the victims computer (passwords
currently in the system cache). Clear - Clears the text that is displayed.
Save As...- Saves the text to a file.
Remote Windows Colors
Menu Colors - Changes the start menu, and other menus color to what is
selected. 3D Face Color - Changes the taskbar, buttons color to what is selected. Window Color - Changes the window background color to what is selected. Desktop Background - Changes the desktop background to color to what is
selected (Victims wallpaper needs to be "none" or else the desktop
background color will not work).
Print In Remote Screen
Center Of Screen - Places the text that you create in the center of the
screen. Custom - Places the text that you create in the X & Y that you define. Back Color - Changes the text background color to the color selected. Font Color - Changes the text color to the color selected. Font Size - Changes the font size to the selected size. Print Text - Prints the made text onto the screen. Clear - Clears the textbox value.
Remote RAS Manager
Refresh - Refreshes the list of RAS. Rename - Renames the selected RAS. Delete - Deletes the selected RAS. Show "Edit" Dialog - View the Internet setup dialog. Hang Up Connection - Disconnect the Internet Connection. Show 'New Connection' Dialog - Shows the make a new connection screen (this
screen is where you make a new I.E. connection).
Remote ScreenCapture
Connecting -The pest server is split into two parts, so if one part of the
server is shut down, you still have partial-control (some technical stuff). The
screencapture server is seperate from the other functions, so, you have to
connect again. The IP address is the same for this connection (of course :-))
All you need to do is type in the IP address of the victim and click connect. ScreenCapture
Basics - The purpose of screencapture is to allow you to view the victims
desktop, as they can see it on there monitor. This is one of my favorite parts
of PEST. When you connect to the screencapture server, the screen refreshes
automatically. You will now see a screenshot of the victims desktop. Hehe! Refreshing the screen - To update the image, click the button with the
circular arrows on. This will start a new screenshot download, and within a few
seconds, you should see the screen update. Sometimes, the screen becomes
scrambled (the reason for this is highly technical, to do with the way it
updates the image). To fix this, either reconnect to the screencapture server,
or press the button with the down arrow on (to do a complete refresh). Streaming Images - This will automatically update the image every few
seconds. You can choose the number of seconds between each refresh in the box
below. NOTE: setting the seconds too low will cause the screen to scramble as
explained above. Disconnect - This disconnects you from the screencapture server. Save screenshot - Click this button to save the screenshot to your hard
disc! So you can remember the time you hacked your friend ;-) Image Options -This allows you to choose the format of the image, from
the following selections:
greyscale (4-bit)
greyscale (8-bit)
color (4-bit)
color (24-bit)
Greyscale (4-bit) is by far the fastest option, but has no color. Color (24-bit)
is true color, but is much slower.
Find Remote Files
Look For - Supply what you want to try to find on the victims pc. Look In Folders - This is not required but it narrows your search down.
Supply a folder to look in. Search In Subdirectory's - Search in sub-directorys of the choosen search
folder. Find! - This starts the search and tries to find the file you suppled. Download Selected! - Download a file you found on the victims harddrive
to your computer. Clear - Clears the search results.
Remote CPU Manager
Clear CMOS - You know when you turn on the computer, you see all that white
writing saying detecting IDE etc. Well that is all controled by a program stored
on the motherboard called CMOS. CMOS is the computers BIOS (Basic Input Output
System). Without CMOS, the computer will do nothing at all when you turn it on,
and reairing the 'damage' is expensive. Clear CMOS will delete the CMOS program
from the motherboard. ONLY USE THIS OPTION IF YOU KNOW WHAT YOUR DOING. Enable CPU Beep - This makes the victims computer beep like holding down
Ctrl-Alt-Del But it last forever! Disable CPU Beep - Disables the beep.
Matrix Emulator - Mimics the scene in the file 'The Matrix' where the computer talks to neo in green writing. You can choose to allow the user to talk back. In windows 9x the black screen that appears is un-closeable and cannot be escaped.
The PEST community and rules
You can take part in forums discussions about PEST on the pest website at www.pesty.cjb.net.
The PEST IRC chat room The PEST chat room is on the webstite at the above address. If you have mIRC you can access it on
irc.mircx.com #PESTy.cjb.net
RULES OF THE PEST COMMUNITY
1.) Spamming will get you a perminant ban.
2.) Impersonating PEST staff will also result in perminant ban.
3.) If we find that the chat room is constantly abused by visitors, it will be shutdown.
4.) DOS attacks or any other attempt to hack or crack the PEST website or IRC chat facility will result im much more than a ban ;-)
CREDITS PEST v3-2 design, coding:
MonkeyCircus - Im usually around on the IRC chat room and Forums, or you can email me at
monkey@monkeycircus.cjb.net
If I catch anybody impersonating me or any other staff member, you better go where I cant find you ;-)
PEST testing:
Rabid Tangerine - Im usually around on the forums and IRC chat room Genoshin-GX
- Me too, hehe
MonkeyCircus can build LAN/WAN networking software to requirements, if you are interested in free
networking software, e-mail MonkeyCircus at monkey@monkeycircus.cjb.net
Thank You And I Hope This Made Your Life Easier With PEST!