Giveaway of the Month: Kaspersky Internet Security 2012

How to Hack E-Mail Account Password - Email Hacking Software


How to Hack E-Mail Account Passwords Using Trojans and Keyloggers

I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?

1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:

3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:

6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.

7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.

12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.

13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.

14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.

15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Do you have questions, comments, or suggestions? Feel free to post a comment!

Liked this post? Make a PayPal Donation to keep us strong.

Subscribe to this Blog via Email:

Click here to Subscribe to Computer Hacking and get all new tricks and regular updates to your inbox!!


39 comments to "How to Hack E-Mail Account Password - Email Hacking Software"

TibiaNerd said...
May 22, 2010 at 10:02 PM

how to get the ip and the port from victim :S ?

Aleksandar said...
May 22, 2010 at 11:44 PM

@ TibiaNerd

After the victim runs the keylogger on his computer, his ip adress will be sent to your email (the email that you've used in ProRat)

exchange training said...
May 27, 2010 at 5:16 AM

i think this hacking is a very difficult, anyway thanks for posting this. thanks for your ideas.

MoUdY said...
May 27, 2010 at 5:37 PM

Amazing post like always..Thank you :)

blake said...
May 30, 2010 at 1:29 AM

ok i love your work it beautiful only one problem I have winrar and I don't know how to password protect it into a zip file so I'm stuck on number 10 please help keep up your good work tho or email me at thanks again

blake said...
May 31, 2010 at 8:09 AM

ok so i recently installed this few days ago prorat and i love it but now since ive deleted it from my comp n re install it on prorat the program like everything on it has ????? for the text the words i need help how can i make this back to normal

Anonymous said...
June 4, 2010 at 8:08 AM

sorry i dont know how to send trojan to victim?
what V i a e-mail?is it like you use out look office on your pc?
Sorry i new in this

Anonymous said...
June 5, 2010 at 2:59 PM

pleas someone know how to send projan to victim?
i cant send it not pass because it exe.file

Aleksandar said...
June 7, 2010 at 12:32 AM

You can bind the trojan server file with another file. Read the post carefully, everything is explained.

Anonymous said...
June 9, 2010 at 2:53 PM

This shut down my computer, I have to completely wipe it down now.

Aleksandar said...
June 9, 2010 at 5:15 PM

I wrote on the post: "Very important: Do not open the "binded_server" file on your system".

Anonymous said...
June 13, 2010 at 1:41 PM


Anonymous said...
June 14, 2010 at 10:46 PM

When i try to attach the file to an email it will not let me attach the file because it either finds it as infected or not supported file type. Is there any way around this, or some way to be able to send it?

Aleksandar said...
June 15, 2010 at 5:11 PM

You can add the file to a WinRar archive and then send it via email.

Anonymous said...
June 16, 2010 at 9:14 AM

So, just a comment. Even though I put it under WinRar it was still detected. Email server still found it to be a virus. The only way I was able to actually even attach the file to the email was if I password protected the archive since. Password protecting it didn't allow the email virus scanner to scan it. Therefore, I was able to send. I just included the password in the email. >=] MUAHAHA. lmao.

Anonymous said...
June 16, 2010 at 9:16 AM

Oh! I didn't read the directions thoroughly on number 10. "PASSWORD PROTECT" My mistake. Great Info!

Anonymous said...
June 16, 2010 at 3:13 PM

what is the best email, I could use in prorat? yahoo detected my email as a spam, my 1st test is okey after i test it again, it was detected as spam by yahoo server. thank u

Pranav said...
June 27, 2010 at 2:45 AM

nice hacking trick it worked

John said...
August 20, 2010 at 1:27 PM

Hi Aleksandar,

You are doing some awesome work on this blog! I am tempted to share my problem with you. One of my gmail account has been disabled by gmail (actually i was using it for phishing purposes.. guess they have figured it).. now when I try to log in it automatically re-directs me to a page that says "sorry you account has been disabled...".. I have some really important data saved there.. Is there anyway by which i can get access into a disabled gmail account? Can I atleast forwards all my e-mails from that account to some other "safe" account? Please help, buddy!


Anonymous said...
August 28, 2010 at 3:48 PM

Fzzz... Bzzz...

TUTORIAL: Email Hacking Software
DESCRIPTION: Great Tutorial!
PROBLEMS: No Problems
QUESTIONS: What is a Trojan?; What happen if the server.exe file be runned on more than one computer?
What happen if the file be scanned by the victim? Is ProRat a FUD file?
ANSWERS: Please answer...

Nancy said...
September 6, 2010 at 9:34 AM

Nice post about "How to Hack E-Mail Account Password - Email Hacking Software", but its not good to hack another person password because the person might be stored some important information in their mail id. I just want to recommend you one thing if in future you email get hacked then no need to worry about it because we have solution with our software which prevent the lost password. Our Data Recovery Services helps to recover hard disk data in class 100 clean room.

Anonymous said...
September 6, 2010 at 7:51 PM

I actually stumbled across this website doing a Google image search but found it quite interesting... Minor correction if i may, Trojan Horses are not a means of hacking, it is a means i guess of scripting and social engineering. I'm not coming down on anyone for the use of Trojans, everyone has their reasons, but understand that just because you can hijack a machine using a program doesn't make you a hacker, you start to fall into that lovely bunch of characters known as script kiddies, and we all don't want that now do we.

Ending my point, use these tools to your advantage for sure, but also extend your knowledge base by understanding them and embracing their power. :)

Anonymous said...
September 15, 2010 at 3:44 PM

as soon as i extract the file anti virus has deleted this. tell me the solution bro. thanks

Aleksandar said...
September 15, 2010 at 4:25 PM

You need to crypt/bind your server, so it will be fully undetectable.

honey said...
September 17, 2010 at 6:04 PM

hii alek nice work man awesome bro i did everthing as shown in ur artical bro i have litle problem when i try to connect my prorat it wont connect i put my ip am using wifi is there any problem ??? should i need to connect prorat ??????

Anonymous said...
September 22, 2010 at 1:11 AM

As you said it sends the ip address to email , does it works like a key logger also?

Anonymous said...
October 7, 2010 at 6:17 AM

Im new to this but am very much interested in knowing about programmer and ready to pay for the training!!!

Anonymous said...
October 14, 2010 at 5:59 AM

managed to bypass the email server by binding, but the computer anivirus still picks it up, how to get past this? is there a way to bind it so it will look like an jpg file or mp3 file? getting desperate, really need the info from that computer.
Anyone can hack a yahoo account for me?

Anonymous said...
November 14, 2010 at 8:17 PM

I am an idiot i know, But my avg said its dangerous, (backdoor trojan) i just want to make sure that my aunts work comp isnt in danger. Can someone who has done this vouch that no harm will be done to the comp.

Anonymous said...
November 23, 2010 at 5:11 AM

My anti virus software says that it is trojan.... Can I trust you?

Aleksandar said...
November 23, 2010 at 6:34 AM

It's detected only because it's a RAT. You need to crypt it in order to make it undetectable. Anyway the program is 100% safe, you can check google and see the other people comments.

Anonymous said...
January 5, 2011 at 11:17 PM

I accidentally run the serve.exe on my computer. How can I wipe it out? Please helps.

dnvlg said...
January 6, 2011 at 12:34 AM

I sent serve.exe to victim and he has run it (I bound it in a picture, and sent him.) But I can not connect to the serve, nor I get his IP in my mail box. Could you please point out what error I possibly made during the process?

Thanks buddy, this blog is very helpful.

Aleksandar said...
January 6, 2011 at 9:10 AM

Open Task Manager and in Processes remove server.exe.

Anonymous said...
January 29, 2011 at 12:48 PM

will this work on a Mac?

Sơn said...
February 20, 2011 at 2:33 PM

I love you so much...thanks

Anonymous said...
April 13, 2011 at 1:04 PM

Hi, i think this is great!
It's just...i have two problems.
1. I had direct access to the computer, and i put the trojan on my USB and opened it on the victim's computer and it didn't give me an e-mail telling me the victim had been infected.
2.I sent the trojan to my friend but he is too dumb to know how to un-zip it. So now what do I do?

Well anyway, great post!

Anonymous said...
June 2, 2011 at 10:25 AM

Do you get to choose what message you send to him or is there a default message?

Also, great post!!!

Anonymous said...
February 9, 2012 at 7:15 AM

ok i have physical access to the computer i want to hack ... all im interested is in the keylogger to monitor msn messenger conversations and passwords without the individual knowing ...should i just put the "binded_server" file in a usb memory and run it ?

Post a Comment


Copyright 2014 All Rights Reserved Revolution Two Church theme