Sunday, October 7, 2012

KEY LOGGERS

In my previous post,i had given intro to the key loggers in this post i going share about how the hacker is going prepare for this attack(keyloggers)


***but keyloggers not only for computers but also mobiles 

the basic aim of keyloggers is to monitor the childrens pc as well some networkig use
 but this can be misused by hackers for their autonomous purpose

***note:: the articles which are in my blog, are completely  for education purpose , i am not responseble of any damage of your system or any other (these are completely education purpose only)





there are so number of keyloggers available on at online
 lets know about the basic and simple tool---all in one keyloggers

Let us now help you in using a keylogger not only to hack Facebook, Hotmail, Gmail or any other password but also to keep track of any activity on your personal computer. Please note that this tutorial is only for educational purposes. Do not use it to harm some one or with any bad intention. Author won’t be responsible for any misuse.

Step 1 - Download and Install: 


Install any freely available KeyLogger. We are going to install a trial version of "All in One KeyLogger". You could download it from following link.
   

Download and Install it. After installation a window will pop up asking you to enter the pass phrase. Please remember that pass phrase will be used in future to interact with the keylogger. Set any word which you could remember easily.

Step 2 - Interacting with KeyLogger:

In order to start the keylogger follow the instruction that is being displayed in the box that appears up next. In order to interact with keylogger i.e. even to start its UI you need to enter the pass phrase anywhere e.g. open a notepad and enter it.
Now your logging has started. Every activity on this machine is going to be monitored. You will have access to all the data. To check the validity of the keylogger, open up gmail and enter the e-mail address and password. This could be the fake e-mail id and password. Now let us track down the id and password. To start the keylogger open a notepad and enter your pass phrase. KeyLogger main windows will pop up.


 





Step 3 - Main Window Settings:
In order to execute the Keylogger in proper stealth mode select the settings of your choice. Remove the icons and its task for the task manager so that no one could track it. After you are done with the settings click the "Open Log Viewer" option.













Step 4 - Extracting Passwords:
Click on the "View Text Log" option. Instructions will pop up explaining you how to extract the password from complete log.

In order to extract a password from log search for the mail client or anything you know about the id. In the search field and click pressing next until you see the id and password that you entered in step 2. 

If you dont know anything about the e-mail id. You should take help from other logging options. E.g. you could search at particular time what username and passwords were used or even view the web logs. 

Please view the images for further explanations.


Step 4 - Extracting Chat Log, Web Log and Visual Log:

Click on the "View Chat Log" option. All the Chats that are being done under the surveillance will be displayed.

Click On "View Web Log" Option to view the web history.


Click on "View Visual Log" to view the Visual History. This feature captures screen picture after fixed intervals and keep track of visual history. This will allow you to track the video that are being played along with the audio (For audio use "View Audio Log" option). Click on the image to view the Image in proper size.


Step 5 - Logging in discrete mode:



Click on close window button and option will be displayed to you that wither you want the keylogger to exit at the moment or you want it to keep logging in stealth mode. Select the option you like. Please note if you selected "Run when Windows starts" option in main settings window keylogger will automatically start up when your system boots up next time. So you will have the logs available. You could also change the location where you want the logs to be saved. 



***note:: the articles which are in my blog, are completely  for education purpose , i am not responseble of any damage of your system or any other (these are completely education purpose only).this information from-http://www.noyep.com/2011/08/level-basic-how-to-use-keylogger-to.html