Ethical Experts
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
HomeHome  SearchSearch  FAQFAQ  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!

Display results as :
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Keyloggers: The Basics  EmptyTue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Keyloggers: The Basics  EmptyFri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Keyloggers: The Basics  EmptyThu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Keyloggers: The Basics  EmptySat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Keyloggers: The Basics  EmptySat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Keyloggers: The Basics  EmptySat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Keyloggers: The Basics  EmptyWed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Keyloggers: The Basics  EmptyFri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Keyloggers: The Basics  EmptyFri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
Hack Your BroadBand !! RISK FREE !!
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
Hacking With Keyloggers Prorat
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
wifi netcat hack LARGEST
Facebook Like
Similar topics


     Keyloggers: The Basics

    Go down 
    The Joker
    The Joker

    Posts : 182
    Join date : 2012-06-11
    Age : 28

    Keyloggers: The Basics  Empty
    PostSubject: Keyloggers: The Basics    Keyloggers: The Basics  EmptySun Jan 06, 2013 10:13 pm

    Lets first understand keyloggers and keylogging: Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software. here i am discussing only software keyloggers.
    What is a Keylogger?

    The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
    A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work.
    In simple words KeyLogger Software allows you to find out what other users do on your computer in your absence. Key logger invisibly records keystrokes of every user activity performed on the computer in encrypted log files with option to send the details at specified email id.

    How Keylogger works?

    Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
    How to install the keylogger?
    A keylogger can be installed just like any other program. Just follow the instructions and you’re done.

    After installation of the keylogger can the victim come to know about it’s presence?

    No. The victim will never come to know about the presence of the keylogger on his computer. This is because, once installed the keylogger will run in total stealth mode. Totally invisible to anti-viruses and anti-spyware, Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his PC.

    Can I be traced back if I install the keylogger on some other computer?

    No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

    The Best keylogger:-

    Today there exists hundreds of keyloggers in the market and most of them are no more than a scam. so here i am discussing a software that is genuine and tested by some great geeks and also it is recognized by BBC, CNN, CBS..etc.
    Best Keylogger: SniperSpy (tested)
    How SniperSpy works?
    After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.
    When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.
    You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

    I don’t have physical access to the traget computer. Can I still install keylogger?
    Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

    Can I install Keylogger on a local computer?

    If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module. Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.
    What if the antivirus block from sending it as an email attachment?
    some antiviruses (attachment scanners) may block it, for this do on thing Instead of sending the keylogger as an email attachment, you just place the file in .ZIP/.RAR format and upload it to some file sharing site like , , ..etc. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

    Some Facts About SniperSpy – why it is the best?

    SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
    SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
    SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.
    SniperSpy captures full-size screenshots of the activities on the target PC.
    Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
    SniperSpy is more easy to install and requires no extra knowledge.
    SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.
    Some keyloggers capture screens, rather than keystrokes.
    Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

    note:- most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.
    Enjoyed this post? be sure you share it , because sharing is caring!

    Do NOT PM me until you are DONATING or Your Upgrade  hasn't been completed even after you have purchased it .
    If is one of the above, you can either choose to PM or mail me ..
    Back to top Go down
    View user profile

    Posts : 2
    Join date : 2012-08-15

    Keyloggers: The Basics  Empty
    PostSubject: Re: Keyloggers: The Basics    Keyloggers: The Basics  EmptyThu Feb 28, 2013 2:39 pm

    Bro. Do you have SniperSpy 94fbr ? Hahahha Thank You
    Back to top Go down
    View user profile
    Keyloggers: The Basics
    Back to top 
    Page 1 of 1
     Similar topics
    » Street Fighting Basics

    Permissions in this forum:You cannot reply to topics in this forum
    Ethical Experts :: Hacking Section :: Hacking Tutorials-
    Jump to: