Step 1:- Download the necessary software Beast 2.06
Step 2:- Open the software

Step 3:- Now click on “Build server “button.

Step 7:- Now go to “AV-FW kill” tab.

Step 8: – Now In this put a tick mark on the “disable XP firewall “.

Step 9:-Now click on “EXE icon” tab.

Step 10:- Select any icon and click on the ”Save Server” button and the Trojan will be made.



Step 14:- After That Click on the “Go Beast” Button and You will be connected to victims PC.
Step 2:- Open the software
Step 3:- Now click on “Build server “button.
Step 4:- Now in this window click on the notifications tab.
Step 5:- In the notifications tab click on the e-mail button.
Step 6:- Now In this window fill your proper and valid email id.
Step 8: – Now In this put a tick mark on the “disable XP firewall “.
Step 9:-Now click on “EXE icon” tab.
Step 10:- Select any icon and click on the ”Save Server” button and the Trojan will be made.
Step 11:-Now send this Trojan File to victim.
Step 12:-
As and when the victim will install the Trojan on his system you will
get a notification e-mail on your specified e-mail id while making the
Trojan. This Email consists of the IP address and port of the victim.
Step 13:-Put This IP address and Port in the place shown in the below snap-shot.
Step 14:- After That Click on the “Go Beast” Button and You will be connected to victims PC.