Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects

Write at HWS !!!

Guest Posting

Saturday, December 10, 2011

What is Backdoor ? How to use Backdoor

Using backdoor, hackers can remotely access your computer without any Authentication and do whatever the hacker wants. I will tell you some of the features rest of them you need to try it and find out. These Programs :

  • Work as a key logger.
  • Send any Information from Victim’s PC to the Hacker’s PC.
  • Run any program on the Victims PC.
  • Display any Violating Image on victim’s Screen.
  • Open the CD Drive of the Victim’s PC.
  • Open any Web page on the Victims Screen.
  • Disable any Specific Key or whole Keyboard.
  • Shutdown Victim’s PC.
  • Start a Song on the Victim’s PC.etc.etc…………..
The best backtrack I found is Back Orifice so I am going to discuss it.

Back Orifice

Back Orifice is one of the most common backdoor programs, and one of the most deadly. The name may seem like a joke, but sure, the threat is real. Back Orifice was established in Cult of the Dead Cow group. Back Orifice is an Open Source Program. The main Threat of this software is that by making some changes in the code anybody can make it undetectable to the Anti virus Program running on the Victim’s computer. Apart from the strange title, the program usually gets port 31337, the reference to “Lit” phenomenon is popular among hackers.
  • Basics Back Orifice consist of 2 main parts. The "client" and the "server". 
  • The client is the part of Bo2k that you use to control the other party's comp. By defult, it's bo2kgui.exe 
  • The server is the file you install in the other party's comp in order to control it. By defult, it's bo2k.exe. 
  • Never ever run bo2k.exe on your own comp unless you know what you are doing. 
  • Another ipmortant component is plugins. To put it simply, Plugins are addon for Bo2k. They enhance the power of Bo2k.
  • For a list of plugins for Bo2k, goto the Bo2k official Site. 
  • In order to control the other party's comp, you must first sent the bo2k sever to the other party, and once the other party runs it, you just start your bo2k client and using it you can assert your control. 

How to use Back Orifice ?

How to use it? First you must configure both the client and the server. First let's configure the server.
  • Download a copy of Bo2k and unzip it. 
  • Then run the file bo2kcfg.exe. 
  • A window will appear welcoming you to the bo2k configuration wizard.
  • Click on next (For those experts, they don't use the wizard, they configure it manually.But one thing at a time first.) 
  • Then the wizard will ask you for the bo2k server file(that's bo2k.exe). 
  • By defult you just need to click next. However if you rename it or kept it in another folder, go browse for it. 
  • Now it will ask you if you want TCPIO connection or UDPIO Connection. I would recommand TCPIO. 
  • Now they will ask you what port you want it to listen to. More popular ones are 6666, 54321, 33137, 31336 and 4444. Try to advoid these. Try putting a number that you can remember easily. Avoid 12345, 1080, 8808. 
  • Now they will ask you for your encryption type. Usually you get only to choose the XOR option. Do not choose 3DES if you are not in US. 
  • Now they will ask you what password you want to use.Choose one and remember it. 
  • Then click finished. The wizard will auto config the Client part for you. Be patient you can use it soon.
  • Now sent the server part(bo2k.exe ) to the other party and when the other party runs it, you will be able to connect to it. 

What to do when victim clicks on server ?

  • Start bo2kgui.exe. 
  • Click on file, then new server. 
  • Type what ever name you want to call it. 
  • Now type the ip address of the other party. If you don't know it,then you are out of luck. 
  • If the other party is on irc, just goto irc and type /dns and you will get the ip (plz dun include the <> when typing /dns). 
  • Now click on connect. You should see a window saying "Retriving server capability. Please wait.."
  • However if you see "Cannot connect to Remote server" that means the other party either did not run the Bo2k.exe or he is behind a firewall or maybe he has gone offline. Then you are out of luck. :) 
  • One you have connnect, on the right window you should see some folders. I will explain the functions inside the folder in the next post .

Download Back Orifice 2000

  • Back Orifice 2000 can be downloaded at the following address:

How do I delete Back orifice 2000

Removing Back Orifice 2000 may require that you change the registry settings. To remove it at 7 simple steps, refer to the diagram below.
  • Click Start> Run, and type “Regedit”(without the quotes)
  • Follow the path below: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices “
  • Now looking in the right box: “The umgr32 = ‘c: \ windows \ system \ umgr32.exe”
  • Right-click on this entry and click Remove. Now restart your computer.
  • After restarting only open Windows Explorer. Make sure you can see all registered extensions. To do so, select “View Options and configure the appropriate settings.
  • Go to the WINDOWS \ SYSTEM directory, and find “umgr32.exe” file. Once you find it, delete it.
  • Exit Windows Explorer and reboot again
NOTE : Only for educational purposes and If I got good response on it ,I will furthur explain the functions of folder and also how to add plugins in it.So give your comments if you like it !!!

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!

Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.


thx xeo for your hard work
i have a question :
if the victim restarted his PC or turn it off , when he turn it on back again if i want to use the backdoor he have to open bo2k.exe again or it will run as soon as the PC turn on?

once its installed ..... it will remain active unless the victim deletes the windows .....

how to send this file to sumone? in mail it is detected as virus so cant send it like that, how would u do it?

@Sheharyar u have to manually install it on victim's pc or shorten the link and then send it to user

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Please do not spam Spam comments will be deleted immediately upon my review.

XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More


Recent Posts

Join Me On Facebook

700+ Followers


meet women in Ukraine contatore visite website counter

Recent Comments

Follow Me On Twitter

1112+ Followers