22 Jul 2012

0 Hacking Facebook - (Keylogging)



One question which everyone is asking these days is'How to Hack  Facebook?.

I would like to answer this question and surely the answer will clear a number of doubts.

First of all,there is NO such software available in which you enter the facebook e-mail of a person and get the answer ! So please stop downloading these fake softwares which claim to Hack Facebook!

Secondly,the security of facebook is quite good as it is one of the prime targets of hackers! But there are a number of indirect ways to hack facebook.
Now i will discuss one of the ways by which you can hack facebook-Keylogging

What is a Keylogger ?

A keylogger is a tool which is used to remotely spy a system.It can be used for both positive and negative work.

What does a Keylogger do ?

A keylogger captures the screenshots of the system of victim,records the keystrokes,can also record video chats and much more.It sends you logs via mail or FTP.





Steps of using a Keylogger to Hack Facebook-

1.Get a good keylogger-download award keylogger(full version) here  or you can look for other ones too.

2.Make a new e-mail id (you can use your own too,but why to take a risk).

3.Now start the keylogger and a number of options will be available to you.Fill the e-mail on which you want to receive the logs.Apart from that make sure you keep such settings that your logger is not detected by the victim.You can do this by assuring that :

*Keylogger's installation files hide themselves after getting installed.
*Icon of logger does not appear in task bar,start menu programmes.
 After you have successfully installed the logger,soon you will start receiving logs of victims pc on your mail which would include his Facebook Password too..!

0 Hacking Facebook - (Remote Keylogger)

A Remote Keylogger is logger in which you make a server from your Keylogger and when the victim clicks on the logger the server gets installed on his system and you start receiving the logs from his system and you get their facebook password when they log into it. I will use Ardamax Keylogger to make a server which gets remotely installed in the system of victim.You can download Ardamax Keylogger from here .
Features : 
You can see victim's Keystrokes,Web record,Application record,Webcam images,Screenshots,Chat logs etc.
Here are the steps for making a successful server from Ardamax:
1.First make sure you have updated it to full version by entering the Pin by right clicking the try icon and entering key from the pass.txt file.
2.Now right click the tray icon and select "Remote Installation".
3.Click on "Next",then in "Appearance" also click "Next".
4.In "Invisibility" make sure all options are cheked,click "Next".
     


5.Now you will see a "security" column.If you want to,then put a password.It all upto you.
6.You will see "options" column now.I will recommend you to put the Hidden Mode as the victim will not be able to see the logger installed on his system.If you want the logger to delete itself after sometime then select the date from "self destruct" mode.
7.Now "control" mode will come up.Tick on "send logs after" and determine the time after which you want the logs to be send to you on your mail.Review other setting and make changes if you want,else click "next".
               
8.Now enter your mail id and password on which you want to receive all the mails,I recommend you to make a new account.Click "next".
9.Now make setting according to your requirement and after that keep clicking next till you reach " Destination" folder.Now specify the destination where you want the server to be installed(the default one can also be kept as it is).You can also change the icon as per your requirement.I recommend selecting an icon which is presentable and victim easily accepts it from 
you,like a song or an image.
               
10.Click "next" and then "finish".Your server is built now.All you have to do is send it to the victim to hack his facebook,gmail,yahoo accounts and have full access to his system.
p.s.- I'll recommend to use a crypter and a binder to make the server more presentable.

Note:
This is for educational purposes only,author does not take any responsibility for misuse.

0 Get Crypters(50 above) and Binders(2) For Free !



On demand of readers I am posting a list of over 50 Crypters and 2 Binders which I find the best . For any further information on crypters and binders and how to send them over the internet please check out the "Related" Posts.
P.S. - Not all the tools may work as I have not tested all of them.Some of them I downloaded from sites just to provide as many as I can to my readers.
Please don't comment telling that some don't work.



Download : You can download the file here .



Information Gathering Using Maltego

http://resources.infosecinstitute.com/information-gathering-maltego/

About CISCO Certification offered by InfoSec 

 

0 How to Send Virus,RAT,.EXE Files to Victim on Facebook,Gmail,Yahoo etc.




Ways to send your server,viruses and .exe files via internet to your victim :

1. Binder - Binder is a software which is used to bind or collaborate the server or virus you have created with some other file like a MP3,JPEG or any other file.You can fool the victim by sending him a song or picture and as soon as he opens the picture or song the Binder also gets open and starts working.Get a binder here .

2. Crypter - A crypter is a tool which changes the binary code of the .exe (virus,RAT etc.)file and applies many encryptions on it which makes the .exe file undetectable.You can get Chrome Crypter here.
If you get a Survey before download then check the post here to bypass surveys.




3. Zipping - Another smart way to  send files is by putting your server in a Zipped folder and then sending it to the victim.Zipping the file changes the extension of the srver from .exe to .zip,which bypasses the file transfer facility of gmail,facebook,yahoo etc..

4. Extension - You can change the extension of the Server you want to send as it is not possible to send .exe files,so you can change the extension of .exe to .jpeg,.mp3 etc. when you save the file and then send it to the victim.But in this method you will have to tell the victim to change the extension back to .exe after he receives the server.This method can only be used in cases where the victim is very dumb and has no knowledge of this field.


So,if you use crypters to change the code and binders to bind the virus,.exe file etc. with any other file and then send it to the victim by making it more presentable then you can easily RAT his system,Remotely log it etc.

0 Building a Successful Server for Remote Keylogging (Ardamax Keylogger)

I have posted articles on Remote Keylogging earlier too.But due to doubts of people I am posting a detailed article on how to build a server of remote keylogger using Ardamax Keylogger.For initial introduction to keylogger you can refer this post and this post too.
Download Ardamax Keylogger Full Version here (it has serial with it).
Steps of Building the Server with each and every screenshot :
Open the setup and start the installation process :
1.

        
 2.
   3.                             
Copy the path of the installation file,you can delete it anytime your want using the path.
                               
  4.                               

Right Click on the icon of ardamax and select "registration".
                                    
                                                        
  5.
Fill in the details as provided in the file.


 
                                  
 6.
The path is of a max payne picture,which will be opened when victims clicks on the server.You can also attach any pic.

 7.
Select all of them,as they will make the server invisible.
                                   
 8.
If you want,you can add a password to open up the logs.
                                   
 9.
You can use combination of keys to make logger appear from hidden mode.
                                

10.
These are the preferred settings.
                            
11.
Enter your gmail username and password,click on Test if you want a demo mail.
                                    
12.
After highlighting each option separately click on setting.
 
 13.                           

These are the recommended setting for mail delivery,use them for other options in last step too.
                            


    14.

Path where you want to install the server,change the icon as per your binded file.
                                                               
     15.
Server if made !
                                  
     16.
"Install" is the server I made.
                                   
       17.
When I click on Install,this max payne pic opens up which I had binded in step 6.
                                  
        18.
Here i receive the logs.
                                 

To send the made server check the posts in related. You can get "chrome crypter" here .
Courtesy : Thanks to Mr.Anish whose one of my reader for giving me the chrome crypter as mine had    gone corrupt :P :D.
 

Devil Dawn [ Irzzat Badut ] Copyright © 2011 - |- Template created by O Pregador - |- Powered by Blogger Templates