Ethical Experts
Ethical Experts
Ethical Experts
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  Latest imagesLatest images  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Keyloggers: The Basics  EmptyTue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Keyloggers: The Basics  EmptyFri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Keyloggers: The Basics  EmptyThu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Keyloggers: The Basics  EmptySat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Keyloggers: The Basics  EmptySat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Keyloggers: The Basics  EmptySat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Keyloggers: The Basics  EmptyWed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Keyloggers: The Basics  EmptyFri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Keyloggers: The Basics  EmptyFri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
Hacking With Keyloggers Prorat
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
netcat hack LARGEST wifi
Facebook Like
Similar topics

 

 Keyloggers: The Basics

Go down 
2 posters
AuthorMessage
The Joker
Admin
Admin
The Joker


Posts : 182
Join date : 2012-06-11
Age : 33

Keyloggers: The Basics  Empty
PostSubject: Keyloggers: The Basics    Keyloggers: The Basics  EmptySun Jan 06, 2013 10:13 pm

Lets first understand keyloggers and keylogging: Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software. here i am discussing only software keyloggers.
.
What is a Keylogger?

The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work.
In simple words KeyLogger Software allows you to find out what other users do on your computer in your absence. Key logger invisibly records keystrokes of every user activity performed on the computer in encrypted log files with option to send the details at specified email id.

How Keylogger works?

Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com/ and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
How to install the keylogger?
A keylogger can be installed just like any other program. Just follow the instructions and you’re done.

After installation of the keylogger can the victim come to know about it’s presence?

No. The victim will never come to know about the presence of the keylogger on his computer. This is because, once installed the keylogger will run in total stealth mode. Totally invisible to anti-viruses and anti-spyware, Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his PC.

Can I be traced back if I install the keylogger on some other computer?

No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.

The Best keylogger:-

Today there exists hundreds of keyloggers in the market and most of them are no more than a scam. so here i am discussing a software that is genuine and tested by some great geeks and also it is recognized by BBC, CNN, CBS..etc.
***************************************************************
Best Keylogger: SniperSpy (tested)
***************************************************************
How SniperSpy works?
After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.
When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.
You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.


I don’t have physical access to the traget computer. Can I still install keylogger?
Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

Can I install Keylogger on a local computer?

If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module. Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.
What if the antivirus block from sending it as an email attachment?
some antiviruses (attachment scanners) may block it, for this do on thing Instead of sending the keylogger as an email attachment, you just place the file in .ZIP/.RAR format and upload it to some file sharing site like http://box.net/ , http://fileden.com/ , http://rapidshare.com/ ..etc. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.

Some Facts About SniperSpy – why it is the best?

SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.
SniperSpy captures full-size screenshots of the activities on the target PC.
Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
SniperSpy is more easy to install and requires no extra knowledge.
SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.
Note:
Some keyloggers capture screens, rather than keystrokes.
Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

note:- most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.
Enjoyed this post? be sure you share it , because sharing is caring!
Back to top Go down
http://teamiha.tumblr.com
bulldogsnake
n00b
avatar


Posts : 2
Join date : 2012-08-15

Keyloggers: The Basics  Empty
PostSubject: Re: Keyloggers: The Basics    Keyloggers: The Basics  EmptyThu Feb 28, 2013 2:39 pm

Bro. Do you have SniperSpy 94fbr ? Hahahha Thank You
Back to top Go down
 
Keyloggers: The Basics
Back to top 
Page 1 of 1
 Similar topics
-
» Basics of XSS Hacking
» Tutorial On Ardamax 3.0 Keyloggers
» Cross Site Scripting (XSS) :- The Basics

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: