Showing posts with label Keylogger Tutorial. Show all posts

How to detect and remove key-logger from PC

Try these Programs:

If necessary, do all the work inSafe Mode with Networking.

To get into Safe Mode with Networking, tap F8 right at Power On / Startup, and use UP arrow key to get toSafe Mode with Networking from list of options, then hit ENter
Read all info below before starting:

Download Malwarebytes

Malwarebytes is as the name says, a Malware Remover!
Download the Free Version from the link above.
Download, install, update and scan once a fortnight.

How to use Malwarebytes after it is installed:

1. Open Malwarebytes > Click on the Update Tab across the top> get the latest updates.

2. On the Scanner tab, make sure thePerform full scan option is selected and then click on theScan button to start scanning your computer

3. MBAM will now start scanning your computer for malware. This process can take quite a while.

4. When the scan is finished a message box will appear

5. You should click on the OK button to close the message box and continue with the Malwareremoval process.

6. You will now be back at the main Scanner screen. At this point you should click on theShow Results button.

7. A screen displaying all the malware that the program found will be shown

8. You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

9. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.

10. You can now exit the MBAM program.

If neccesary, also scan with this Program

Download Spybot Search & Destroy v1.6.2

Spybot Search & Destroy 1.6.2 is a very good, FREE Anti-Spyware Program.
Download, install and update it.
Once installed > Right-click on its Desktop Icon > Run as Admin
Then SCAN with it.
Update it, and scan your System once a fortnight.

Important :

If you happen to find a problem that you can’t uninstall / delete, reboot the computer, and go into Safe Mode.
To get into Safe Mode, tap F8 right at Power On / Startup, and use UP arrow key to get to Safe Mode from list of options, then hit ENTER.
RESCAN your computer with your Anti-Virus, Malwarebytes and Spybot S & D while in Safe Mode.

If unable to install above Programs in Normal Mode:
Sometimes Trojans, Viruses, Malware, etc stop you installing and/or updating Programs to remove them.
If that happens, reboot into Safe Mode with Networking (from F8 list of Startup Options), and install, update and scan from there.
Read more

Keylogger Tutorial

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.

Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

About keyloggers
A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

There are other approaches to capturing info about what you are doing.
* Some keyloggers capture screens, rather than keystrokes.
* Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. 
Or a keyloggers could be which boasts these features:
* Stealth: invisible in process list
* Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
* ProBot program files and registry entries are hidden (Windows 2000 / XP)
* Includes Remote Deployment wizard
* Active window titles and process names logging
* Keystroke / password logging
* Regional keyboard support
* Keylogging in NT console windows
* Launched applications list
* Text snapshots of active applications.
* Visited Internet URL logger
* Capture HTTP POST data (including logins/passwords)
* File and Folder creation/removal logging
* Mouse activities
* Workstation user and timestamp recording
* Log file archiving, separate log files for each user
* Log file secure encryption
* Password authentication
* Invisible operation
* Native GUI session log presentation
* Easy log file reports with Instant Viewer 2 Web interface
* HTML and Text log file export
* Automatic E-mail log file delivery
* Easy setup & uninstall wizards
* Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP


Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Security - allows you to protect program settings, Hidden Mode and Log file.
Application monitoring - keylogger will record the application that was in use that received the keystroke!
Time/Date tracking - it allows you to pinpoint the exact time a window received a keystroke!
Powerful Log Viewer - you can view and save the log as a HTML page or plain text with keylogger Log Viewer.
Small size – Ardamax Keylogger is several times smaller than other programs with the same features. It has no additional modules and libraries, so its size is smaller and the performance is higher.
Ardamax Keylogger fully supports Unicode characters which makes it possible to record keystrokes that include characters from Japanese, Chinese, Arabic and many other character sets.
It records every keystroke. Captures passwords and all other invisible text. 

Other Features:
Windows 2000/2003/XP/Vista/Windows 7 support
Monitors multi-user machines
Automatic startup
Friendly interface
Easy to install
Download Ardamax Keylogger (1.94Mb)

Perfect Keylogger for Windows 98/2000/XP/Vista and Windows 7

The latest, improved and most stealth version of Perfect Keylogger is now available only after purchase. To protect the product from abuse and improve its quality for the registered users, we no longer offer the trial version of the latest builds. The localized versions of Perfect Keyloger and 64-bit version are also available after purchase. The last public version is still available, but keep in mind that it's not the latest and may be flagged by security software.

Download Perfect keylogger
Read more

How to hack Facebook account Using keylogger

Hi friends! Its my new trick to tell you all how to hack any facebook account's password using keylogger. Its an interesting article though everybody wants to hack facebook's account in today's date. Simply, facebook hacking is not easy but by trying you can do anything. You have to be diligent in your job. Then after, you can succeed. So, become determined to hack any facebook account. Firstly, i will tell you a trick to hack it with keylogger. But be careful while doing this. I may request you all to take any IP address changing sofware while doing this.

Just follow the Steps to hack-

1> Download emissary keylogger from here(free)-

2> Remember that you must have Microsoft Net Framework installed in your PC. This software is compulsary for any hack. Downlaod it from here-

3> Download and install both software on ur PC. After doing so, open emissary.exe

5> Now, fill in your Gmail username and password in respective fields (You can create a gmail account that you're going to use only for keylogging). Enter the email adress where you wanna receive facebook passwords. Choose a name for the server.exe file. You can set timer as you wish. This timer controls the time interval between two logs emails.

6. In the "Options" section you can see what this evil little buddy can do ;)

Block AV Sites: Blocks VirusScanning Websites on victim's computer

Add to Startup: Adds to Startup via Registry

Antis: Anubis, BitDefender, Kaspersky, Keyscrambler, Malwarebytes, NOD32, Norman, Ollydbg, Outpost, Wireshark

Disable TaskManager: Disable TaskManager on victim's PC

Disable Regedit: Disable's Regedit on victim's PC

7. Check "Trojan Downloader" to Downloade and Execute a trojan on victim's PC. You can also create a fake error message and scare your victim, like:

8. After you're done, hit on "Build" and you will get server keylogger file created in current directory.

9. Now, to hack facebook password, you have to send this server file to victim and make him install it on his computer. You can use Binder, Crypter or Fake Hacking Software to bind this server file with say any .mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge.

10. Now because this is a server.exe file you can't send it via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to Free File Storage Domains, like Mediafire, Speedyshare,, etc.

11. Once the victim runs our sent keylogger file on his computer, it searches for all stored passwords and send you email containing all user-ids and passwords, like:

Now the victim's password is yours.... ENJOY!

Read more