Friday, July 22, 2011

FAQ: What is Binder and How to Use It for Hacking?

Binder is a software used to bind hacking tools, viruses, trojans with say images, mp3, exe, batch or any other file, you desire. In this article i'm going to explain you what is Binder and how can you use it for hacking.

What is Binder?

Binder is a free software used to bind or combine two or more files in one file under one name and extension. The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. If binded file contains an application ( RAT or Keylogger), the application is also run when the actual binded file is run.

Why is Binder used?

As I have written in previous articles, generally, RATs and keyloggers are detected by most antiviruses. Also, you can't send victim a RAT or keylogger and ask him to install it on his computer. So, you have to bind that RAT or keylogger with say image, movie or song (any file depending on victim) and then ask him to run this binded file on his computer. You can use Ardamax keylogger.

When the victim runs our binded image (binded with Ardamax keylogger) on his computer, keylogger is installed on his computer and we can easily obtain all his typed keylogs.

How can I get a Binder?

There are many binders out on internet. Just Google "Download binder" and you'll get a list of Binders. There are also many forums, like Hackforums where you can find good and free binders. Here you can Download Shock Labs File Binder - binds JPG, MP3, EXE, and BATCH files.

Disadvantage of Binder:

Binders though are useful in hiding keylogger or trojans are often detected by antiviruses as hacktools and hence deleted as viruses. For preventing this deletion and to bypass AV detection, you need to have FUD Binder. You can obtain FUD Binder either from various Hacking forums (where you are asked for money) or by coding one yourself.

Remember, no publicly available Binder is FUD. Binder is FUD only if it's very rarely used and not available publicly.

Also, it is better to use Crypters to avoid AV detection. It is general practice to first crypt the keylogger or trojan with Crypter and then bind the crypted trojan to make it deceptive. There are also many Crypters available on the net and the forums.

Very Important: Do not scan these tools on VirusTotal. Use and also check the "Do not distribute the sample" option.


Post a Comment

Donation Plan:

Site Maintained by Prerna