Hacking through keyloggers Depends on the mode which you are using
1. IF You have Physical access of the System(i.e college computers or Home PC etc..)
2. IF you Don't Have access to that system i.e Remote Computers etc..
1. IF You have Physical access of the System(i.e college computers or Home PC etc..)
2. IF you Don't Have access to that system i.e Remote Computers etc..
Why I am saying these two methods because keyloggers for remote computer are mostly detectable but few are undetectable now also..I will try to provide the Best undetectable keyloggers with Easy to use Interface... So Guys Read On....
First of all We Should Discuss basic Things About Keyloggers..i.e what are these , how they works, will i be caught doing this...and much more.. Starting From the Very First Question..
First of all We Should Discuss basic Things About Keyloggers..i.e what are these , how they works, will i be caught doing this...and much more.. Starting From the Very First Question..
1. What is a Keylogger?
A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.
2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
SAMPLE SNAPSHOTS OF KEYLOGGER DATA ..
3. How to install the keylogger?
A keylogger can be installed just like any other program. Just follow the screen instructions and you’re done.
4. Do I need any special knowledge to install and use the keylogger?
Absolutely NOT! Anyone with a basic computer knowledge can install and use the keylogger. It requires no special skills.
5. Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.
6. Can I be traced back if I install the keylogger on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.
NOW THE METHOD 1
IF YOU HAVE THE PHYSICAL ACCESS OF THE COMPUTER..
First of all As I have Hold in the Previous Hacking class 12 that You will Need the Admin Rights to install the Applications...Hacking the Admin Account has been already discussed in the Previous class... So Read that For Hacking Admin Account.
Now You Have the Admin Rights or Previlages Of the System... Best Method is to use the Inbuilt Keylogger of Firefox...
Note: It generally works only in the versions previous than 3.1 But I hav Edited it and Now It can Work with Later Versions also... So Don't Work and Keep Using It..
Why I am Telling this ?? Its simply because It is absolutely Undetectable... No Antivirus can Detect It (100% safe)..
NOTE: IT ONLY WORKS WITH FIREFOX.. Its a Add on..
HOW TO USE THIS INBUILT KEYLOGGER??
Step2: After Downloading Drag and Drop It into the Firefox. After Dragging You will See Something like This...
Step 3: After That Click on Install And Then Restart the Firefox as Shown in Below Figure..
STEP 4: After Restarting the Firefox .. Now Configure the Keylogger as Shown Below ..
Go Tools --> Add Ons ---> Extensions.... Then Something Like Below Will appear..
Step 5 : Now Everything You type in the Web Browser Will be Recorded by the Keylogger... Itsn't that Easy Like 123..
Keep Enjoying...Here is sample Snapshot of Log of the Victim...
This is all About Inbuilt keylogger of Firefox...
In Next class We will Discuss More things about Keyloggers... So keep Reading..
Hiding Yourself From being Traced ?
Hey guys as I have Already Mentioned above this is only for educational purpose so don't misuse it. I and Isoftdl is not responsible for any malpractice... Now you all thinking why I am saying this.. Itz pity simple because Its the most dangerous part i.e Hiding your identity from being traced by anyone i.e government,ISP,Raw...everything... So Read On...
Let's have a Breif Look up of Topics That we Cover Here:
1. Proxies and Anonymous Web Browsers
2. Anonymizers
3. Tools to bypass Government Censorship :P
4. Tools to Bypass Google Tracing :P
5. HTTP Tunneling for Windows
6. IP spoofing :P
Today we Will Cover First two Topics...
FIRST OF ALL ..
WHAT IS PROXY AND HOW IT WORKS???
Proxy is a network computer that can serve as an intermediate for connection with other computers .
They are usually used for the following purposes:
• As a firewall, a proxy protects thelocal network from outside access.
• As an IP addresses multiplexer, a proxy allows the connection of a number of computers to the Internet
when having only one IP address.
• Proxy servers can be used (to some extent) to anonymize web surfing.
• Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
• Proxy servers can afford some protection against hacking attacks. (For Our Purpose)
HOW AND WHY TO GET FREE PROXY SERVERS ??
~ Attacks using thousands of proxy servers around the world are difficult to trace.
~ Thousands of free proxy servers are available on the Internet .
~ Search for “free proxy servers” in Google .
~ Using proxy servers can mask your trace .
I will recommend two sites for getting the Free Proxy servers. As these sites Daily provides Fresh anonymous Proxies...
1. http://www.tech-faq.com/proxy.shtml (provides almost all type of Proxies)
2. http://proxy.org/ (check the Right Hand Side For Proxies)
BELOW SNAP SHOWING HOW PROXIES USED TO ATTACK..
ANONYMOUS WEB BROWSERS
Anonymous Web Browsers have inbuilt proxy finders they search for proxies by default and make our surfing anonymous...
TWO BEST ANONYMOUS WEB BROWSERS ARE:
1. Invisible Browsing v7.0
DOWNLOAD :
http://www.isoftdl.com/2009/09/invisible-browsing-v70-hide-your-ip.html
SNAPSHOT:

2. BrowZar 2.0
DOWNLOAD:
http://www.browzar.com/download/index.html
SNAPSHOT:
You can also find more by googling it but these two are just Best.. :P
ANONYMIZERS
Anonymizers are services that help to make web surfing anonymous. The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrel.
An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.
Why Use Anonymizer?
• Example: Google.com keeps track of all your web searches on their servers by placing a cookie on your machine.
• Every single search you entered at Google is logged.
SEVERAL ANONYMIZER TOOLS ARE:
1. Hide Platinum IP
2. Hide My IP
3.Hide My Ip Address
Note: I am not providing the Below Three Because Almost 99% of their cracked version contains viruses and Spywares which can cause damage to your system...
The Rest Four Topics About Hiding Our Traces We will discuss Tomorrow..
Hope that You all have Like This...
Download Unlimited From Rapidshare and Hotfile Premium Hack
Hey Guys After a Hectic Research on Rapidshare :P . I reach to a final solution and you all will be surprised to see that we can Download as many as times i.e Unlimited By using my trick. This Tricks Works 1000% . So today I will Show How to Download Unlimited Using Rapidshare. So Guys Read On...
Note: We can download 4 - 5 files Parallel simultaneously...
LIMITATION: Will Work Only With Dynamic IP broadband's like BSNL,AIRTEL etc..
THINGS YOU REQUIRE FOR RAPIDSHARE HACKING:
1. Dynamic IP broadband like BSNL.
2.Any Good Web browser like Google Chrome or Firefox.
3. My Rapidshare Batch File.
4. List of 4 Best premium Link Generators.
5. Good Download Manager Like IDM(Internet Download Manager)
STEP 1 : DYNAMIC IP BROADBAND
This is must for using this hack. This hack cannot be used using static IP's like College ,Office Computers.
For BSNL users its better than Miracle... So Enjoy Frens..
Dynamic Ip means Every Time you connect to broadband you will get New IP address.
STEP2 : ANY GOOD WEB BROWSER
Download Any Good Web Browser like Mozilla Firefox or Google Chrome.
You can Download these from www.filehippo.com
STEP3: MY RAPIDSHARE BATCH FILE
1. Open the Note Pad and Copy the Below Code:
@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
2. Now Save this File as Rapidshare.bat (Note: You can save it as anyfilename.bat but remember to choose All Files while saving).
3. Now Every Time You want to Download From Rapidshare Double Click on It.
The task Is not finished Yet. By this method u can download One file at a time. But As In Start I have Said I will tell you the way to down load Multiple Files Simultaneously...So Read On..
STEP4: BEST PREMIUM LINK GENERATOR
We know that most premium link generators have limitation of downloading one file at a time also after download ask you to wait 2 to 3 min and ask you to visit their sponsor in mean time...
But Using My technique you can bypass that Also...
LIST of 4 Best Premium Link Generators:
SITE 1
SITE 2
SITE3
SITE4
Now You have 4 premium link generator and one simple manual rapidshare download Site i.e the link itself www.rapidsahre.com/files/ like... SO Now you can download 5 files at same time From rapidshare... But this will work only once..Then you have to wait again after that... But I have said Unlimited without Time Limit... hahha...
Yeah read on...
NOW AFTER ALL DOWNLOADING IS FINISHED i.e ALL FIVE DOWNLOADS .. RUN MY RAPIDSHARE.BAT FILE and repeat above process again... Every time You want to download just rum my Rapidshare.bat File by double clicking on that and enjoy free Parallel Unlimited Downloading from rapidshare, Hotfile and All sites like them...
Hotfile Rapidshare Megaupload
Premium Account Link Generator
100 % Working and tested
PREMIUM LINK GENERATORS !
http://www.rapid8.com/OR
DON'T FORGET TO SAY THANKS !
FBI Inspection Tools
World's Best hacking KIT

This a pack of system tools which are used by FBI to analyse and inspect other computers. These must be used only educational purpose, please don't misuse the tools.
Tools included in package :
* ADS Locator (Alternate Data Streams)
* Historian 1.4 (Browser Analyze)
* Disc Investigator 1.4 (File-Slack-Analyze)
* Live View 0.6 (System Analyze)
* MUI Cacheview 1.00 (Registry Analyze)
* Networkminer 0.85 (Network Analyze)
* Regripper 2.02 (Registry Analyze)
* Systemreport 2.54 (PC Analyze)
* USB-History R1 (USB-Stick-Analyze)
* Windows File Analyzer (File Analyze)
* Winpcap 4.02 (Network)
http://www.easy-share.com/1905565857/FBI.Internet.Tools.Pack.rar
Hackers Software AIO 2010
Latest Hack tools Collection
Hackers Software AIO 2010 | 30MB
WARNING TO ALL DOWNLOADERS
By LOKESH owner of www.isoftdl.com
Its hack tools Collection. As I am professional Hacker so I know How to handle Viruses. So I am warning all users that Please Install The Deep Freeze First Before Using this. Otherwise No Antivirus or trojan remover can Help you... As Its a Complete hacker's Package.
This Soft is 100% likely to include viruses and trojans which are so new they are not yet found by anti-virus scanners. if you want to play with very new warez and h4X0r content then you can expect this.
There are solutions to the problem. experts use a program called 'deep freeze' to lock their systems and stop the viruses from working. you can also use registry guards to stop the viruses working e.g. Sandboxie
Beware if your computer is infected with an unrecognized virus then you are also a source of infection for others and you are endangering all your private information and systems.
DO NOT TAKE THIS TYPE OF SOFT IF YOU DO NOT KNOW WHAT YOU ARE DOING
YOU ARE WARNED TO TAKE SERIOUS SECURITY PRECAUTIONS IF YOU DOWNLOAD THIS SOFT







No comments:
Post a Comment