Friday, 4 November 2011

Use Keylogger To Hack passwords

(Update on 8th Dec 2014) Watch Video Tutorial on My Youtube page

Keylogger is most widely used program from script kiddies where they call there self a "HACKER" key-logging is the common way that other person is know all your computer login and other info which you type in your computer. On the other way people ask me how other people (HACKER) know our user names and passwords ? So Here All Your Ans.

Q: What is keylogger?
Ans: Keylogger it's a Hardware & Software base program which work to log all your key-press. (Wiki)

Q: How we know that keylogger is installed in our system ?
Ans: Well there is no way to find out if keylogger server is encrypted but for prevention install latest antivirus update daily basis. other tools Like antikeylogger utility you can find free and paid search on google or here are some that might help you to check
  1. PSMAntiKeyLogger :PSMAntiKeyLogger is a real-time protecting software which protects you against Keyloggers. No scanning is needed.
  2. I Hate Keyloggers : prevent your typing from being recorded by malicious software such as key loggers, spyware, remote administration tools. The software will disable hook-based keyloggers so the keyloggers will not be able to capture your keystrokes.
  3. Paid One KeyScrambler : The advanced key-encryption method keeps your keystrokes scrambled and indecipherable while they travel from your keyboard to the destination application.
* So lets know how they do this kind of dirty work.*
NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk.

In This Tut i will show you a software base keylogger in action (ardamax keylogger sort name in this TuT will Be "AXK")

The setup of AXK is same as you install other software.
"Before We proceed Disable Antivirus or use Virtual OS for not get infected"
Double Click on AXK installation EXE
  1. See Pic. 0.1 will Display.
  2.  Click on "I Agree"
  3.  Select all components Click on Next (Pic 0.2)
  4.  Same installation dir Click on Next (Pic 0.3)
        
  5.  Wait till installation complete (Pic 0.4)
        
  6.  Check on "Run AXK" Now click on Finish (Pic 0.5)
        
  7.  AXK is install in your system that can be check in task-bar (Pic 0.6)
        
Now the AXK will monitor this system key activity But this is not finish yet coz its not the hackers way now the main part in started we need to create silent installer server that can install any windows system with only one click and also hidden so no one will know that keylogger is installed in this system. 

  1. Right click on Taskbar icon (Pic:1.1)
  2. Select Remote Installation
  3. On Welcome screen Click on Next (Pic:1.2)
  4. I am binding AXK with explorer (Pic: 1.3) click on next
  5. In Invisibility I have selected all (Pic: 1.4) click on next
  6. This security page click on enable (Pic: 1.5)
  7. Add password that u want. (Pic: 1.6)
  8. Now select all to protect. (Pic: 1.7) Click on Next
  9. This page is for visibility in-case you want to see hidden keylogger so that can be open using combination of keys like i have selected "Ctrl+Shift+K" (Pic: 1.8)
  10. This page is to select the time and method to get all key-logs from victim's system (i am showing you email method there are also various method to get the log for Eg. ftp, web upload) (Pic: 1.9)
  11. Email page fill all details click on next (Pic: 0.10)
  12. Select Keystrok logging and click on settings.. (Pic: 0.11)
  13. Change teh setting to 1024KB and click on OK (Pic: 0.12)
  14. Now select Destination where the Server file will be saved and what ICON you want to select i saved name as Office_Patch.exe (Pic: 0.13) Click on next
  15. Now click on finish (Pic: 0.14)
  16. Our Keylogger server is created. (Pic: 0.15)
Send this server file to people whom you need User names and Password but this file is easily detected by antivirus same as i have upload this file "Office_Patch.exe" on virus total and as result see (Pic: 0.16)

Now we will make the server file FUD (Fully Undetectable) for antivirus.
For That you required FUD Crypter (More info on: Here)

You can buy that software from other programmers, there are Some free download are also available on net just google "FUD Crypter" and you will find thousand of website for download. But most of free crypter are now detectable via antivirs after some time coz it's publicly available.

To FUD this file i am using my own crypter which is not publicly availble and no antivirus can detect it..
(Please: don't ask me for the crypter it not for sale. In my Future post may be i will show how to make the crypter)
  1. Open Crypter.
  2. Browse and select the file which you wan't to make FUD. (Pic: 0.17)
  3. Click on Crypt (pic: 0.18)
  4. Done.
Now i have uploaded the FUD Server file on Virus total and here is the result (Pic: 0.19)

Now as see the result i can send this file any person who clicks on that file JACKPOT"...

Wednesday, 16 February 2011

PHISHING

After long time here i am back in action so this time we will check how phishing works ?

Q. what is phishing ?
Ans. In my term phishing is like creating a clone web pages for get account details (Eg. user name and password ) of peoples who will login on particular site thinking that they ware login and same site that they have register. for more info on that topic go to this url :http://en.wikipedia.org/wiki/Phishing .

Note:
Before We start i want to clarify that this tutorial is for education purpose only. i am not responsible how you are use following information. I use gmail for Educate how phishing works (if this post is effecting and of google services Please let me know to remove this post)

Whenever we say people that we are hacker they react "ok so what is my mail password of can you hack following id password."
some time they ware ask us some site on Internet provide password of any ID that we want so what is security on internet. every one shoud know that hacking passwords is not that so simple or is really simple as 123 depends the method you are using to hack or crack password.

Here is Gmail Fake Page for phishing attack we use process.php file to get mail of target user id and password.
1. Download only web page of the page that u want to create phishing page Eg. gmail see Pic_1.0. save as Gmail.html


2. Create php file to get desire username and password via mail. see Pic_1.1. or get the source code from my download box.

3. Now first find user name and password tag id in that Gmail.html file Eg. for gmail the use usename id ="Email" & password id ="Passwd" (See Pic_1.2 & 1.3)

4. Now replace the code in your process.php file ($user = $_POST['Email'];) & for password ($pass = $_POST['Passwd'];) like after $_POST["here we fill target id"].

5. Then we see after submit the credential lets check where is the page will redirect for that in Gmail.html we need to find action url see Pic_1.4.

6. Copy from "http" to last Eg. in gmail.html "https://www.google.com/accounts/ServiceLoginAuth" that was a code we will use in out process.php script in last line "header("location:https://www.google.com/accounts/ServiceLoginAuth");"

7. Same time in Gmail.php change action url to forward the the details to process.php so in Gmail.html the code will be like (Eg. See Pic_1.4.1)

8. Now in 3rd line of process.php "$to = '" after that fill the email id where you want to receive victims user name and password Eg. abc@xyz.com so your line will be "$to = 'abc@xyz.com';"
9. Fourth line "$subject = " type subject that you want to receive (Eg. $subject = 'Gmail Details';)
10. Don't change other script code.
11. The phishing.php page is complete. (See Pic_1.5.)

12. Upload the Gmail.html and process.php file on php enable web hosting service provider. and forward gmail.html url to victim whenever the user fill the details on that page we get user name and password via mail. after upload haw the fake page look like.


* How to know that you are not the victim ? *
Phishing is most popular way to get victims Login details as per above method we see how we can create phishing page of gmail same manner we can create any websites fake login page so this tutorial to know how we protect our self bean victim for others. 1. Check the url before login. see Pic_2.1 you will see the login page url is deferent from original login url (Eg. in gmail url will be https://mail.google.com and follows but in fake page you gets different domain name. original.2. Fake page is not provide https login. see Pic_2.1.
3. Use Anti phishing tool bars.
4. Use password saving tools Eg. roboform that is best way to avoid phishing as well as keylogger.

By Anish M.
Ping your blog