Friday, 18 November 2011

ARDMAX KEYLOGGER 3.0 – WITH REGISTRATION KEY


Download The Ardamax Keylogger 2.85

Download it and Install in your computer.

2- Now right-hand click it and click ‘Enter registration key…

3- Enter the Name and password in the box fields…
Name: Kimberley Ronald
Key: RGA3Y3A-M3D88-T3HU5-T28TM-G47A S-SFTD7-624JC

5- Once done click ‘Ok’ and you should get a pop-up saying ‘Registration code is accepted. Thank you for registration!

II. Creating the Keylogger Remote file:

1. Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…



Click ‘Next’
2. Now,you should see this.



3. If you want to bind Keylogger Remote file with another application or file click the box that says ‘Append keylogger Remote file to file or another application’ and browse file or application that you want to bind it with.. I would prefer to skip this and bind the keylogger after creating the remote file.


4. Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.



5. Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.



6. Now you should be at ‘Security’, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’. Or else SkIp this also…



7- Uncheck the update optiong…



8. Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date



9. Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 20 minutes, then where it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done, it should all look like it does in this screenshot:



10. Now you should be at ‘FTP’, create a free account at http://www.drivehq.com then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this:
FTP.DriveHQ.com
Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:




Now Click ‘Test’ and it should pop up like this.



If not then see if the password and username is right.


Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.

11. You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.



12. Now you can change name and icon your Keylogger Engine as you want it to look like.



Just click ‘Finish’.
13. After you click ‘Finish’ you should see this:




Now Your Remote File Is Created

Thats it guyS Enjoy Hacking…

RAPZO KEYLOGGER 2011 – PUBLIC EDITION – HACK ANY EMAIL OR OTHER ACCOUNT

What the things you will need to hack accounts with rapzo keylogger.
Rapzo Keylogger
Resource Hacker
winrar (or any compressing tool)
Microsoft net frame work
A Hosting account (for share this file)

Now Learn Tutorial:

1. 1st of all download Download Rapzo keylogger and Resource Hacker
2. Note You need to install Microsoft Net FrameWork,

Keylogger Setting or how to use keylogger

3. Extract rapzo keylogger file into your hard drive and ope rapzo logger.exe
4. go to rapzo keylogger opetion
5. Click on Enable and check it,
6. if you have not email, then go to google.com click on gmail and make a gmail account, after all enter your gmail username and password.

Example:
Enter username box: (umerrock@live.com)
Enter Pass box: (same pass which you chose)
Logs send to box: (same email umerrock@live.com)

Now click on Test me.

if it will show you tha email is correct then you can check your mails a test mail will in your inbox,

7. Now go to option and check/tick the following components,
(i) tick on encrypt info (it will send you ip adress and system information)
(ii) tick on screen logger (it will take a screenshot from victim computer and send you in email inbox)
(iii) tick on stealers it will record passwords/keystorkes

When you will Select on Stealers a new Box will open then check on Enable all and click ok Save Settings.

After Options Go to Mail Setup and Enter your Amail and password
Enter Info
Enter UserName Box (yourgmail id)
Enter Password Box (Enter ur orignal password)
Logs Send to Box (Enter your Same Gmail id)

After all Click on Test me if the box show like the pic below then ur all setting is correct otherwise check ur email and password.

7. After all last step is this, click on build server, a server file will be created autmatic in same directory.

Guyz this is Additional Step,
Now run the resource Hacker
when you open resource hacker then go to file then click on open then open the server file which you created by Rapzo keylogger.

When you will open server file then click on version info then click on 1 then click on “0″ there you can see file description is Hijackthisfile reaplace it with Microsoft

Then click on complete script and go to file and save it as anyfilename with the extension of jpg.

Thats it now you can bind it with any jepg image file with easy binder and upload it any hosting site like mediafire.com and share with your victim when he/she will run then you can hack it.

LOST DOOR 4.0 – HACKING REMOTE OF A COMPUTER

What the things you Need?
1. A Free Account in www.no-ip.com and there you need a free Host.
2. Lost Door Tool
3. May be you need for Microsft Frame Work (Must Install it Mostly Hacking tools did not work without it.

1. Download Lost Door (Password for Extracting is umerrock)
2. Extract the files in your Hard Drive and Accept it.
3. After it is open, right click on the window and click on create server.
4. Now enter your IP address and DNS here. Leave the rest of the field as it is.
5. Now click on the ‘Options’ tab and choose the options as you want. To activate an offline keylogger is a good practice.
6. Now go to ‘Advanced’ Tab. There will options related to spreading. This will be used in case you have more than 1 victim.
7. Now just go to the ‘Create’ tab and click on create server. Your server is ready for use now and now send it to the victim.
8. After Creating Server Send this File to your Victim, you can upload your server on mediafire and share it with friends and enjoy using his PC…

WHAT IS A TROJAN

Torjan is a program that, which will infect your PC with Virus.


What Torjan Can do with your Computer?

1. It Can disable your Task Manager
2. It Can disable your Folder Option
3. It Can disable your Registry Editor
4. It Can disable your CMD Command Prompt
5. It Can Hack your Computer and Remote Control of the Computer,
6. Hacker Can steal all passwords and exploit any file from your PC.

WHAT ARE KEYSTROKE LOGGERS – KEYLOGGERS

A Keystroke logger (also known as a Keylogger) is a program, usually ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by the keylogger somewhere in secret. These can be attached to other executable so you never even know you ran them in the first place, once you click it once it often is started at start up from their on.

There are two main types of keystroke loggers:


1. Software based, and
2. Hardware based

Software based keyloggers

These are software programs designed to work on the target computer’s operating system. Once the software is installed on the target’s computer, it captures every key pressed on the keyboard and stores it down in a file or memory-bank that can be viewed by the person performing the monitoring in real-time, or at a later date.

There is also a type of remote access software keyloggers. This is a process of creating server keylogger and then sending this server.exe file to the victim. Once the keylogger server is installed on the victim’s computer, all text and passwords typed on his computer are sent to you in your email inbox by this server created using keylogger.

Also, server keyloggers are detected by antiviruses. So, you need to have FUD (Fully UnDetectable) keylogger so that victim computer’s antivirus will not detect your sent server keylogger as virus and prevent it from being deleted.

What do you need to use a Remote Keylogger?

* Accounts to send the Logs to

The most used Method’s of sending logs is Gmail and FTP. For gmail go to goole.com and make a Gmail account and for FTP use a free web hosting provider, like t35.com

* A Keylogger Builder

A Keylogger Builder’s are very easy for you to get your hands on one. There are many keylogger builders that you can use, but they will all be detected by anti-virus or UD (Undetectable). UD Keylogger means that some anti-virus software will detect it and aleart the victim telling him that it is a virus and it will be deleted from his system. What you really want is a FUD Keylogger (Fully Undetactable). That means no anti-virus software will alert the victim saying its a virus. There are very few FUD Keyloggers on web and the most of the time you need to buy a keylogger that will be FUD for a long time. They normally cost about 3$-20$, depending on the functions of the Builder.

Hardware based keyloggers

Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.

The tiny size and ideal location ensures it almost never gets found; and if it does get found, nobody would necessarily know what it was anyway! You can set it up so you can get the data in another location and you don’t need to be able to log on to the person’s machine to install it successfully.



Which type you use depends entirely up to you, the capabilities you have (whether or not you can access the machine) and what kind of data you need. Either way, keyloggers are powerful tools that can pay huge dividends in protecting your home and business.

WHAT IS A RAT – REMOTE ADMINISTRATIVE TOOL

A RAT is also a shortcut called Remote Administrator Tool. It is mostly used for malicious purposes, such as controlling PC’s, stealing victims data, deleting or editing some files. You can only infect someone by sending him file called Server and they need to click it.

What can RAT do?
With a RAT, you can make the party download files, view their desktop/webcam, and more. Here is a list of basic features of a popular RAT:
* Manage files
* Control web browser (Change homepage, open site etc.)
* Get system information (OS Version, AV name, Ram Memory, Computer name etc.)
* Get passwords, credit card numbers or private data etc.
* View and remote control desktop
* Record camera & sound
* Control mouse
* Delete, rename, download, upload or move files
Are RATs Illegal?
Some RATs are legal, and some are not. Legal are the one without backdoor left, and they have ability to close connection anytime. Illegal are used for hacking and they can steal data (Credit Cards, Passwords, private data etc.).
Here is a list of some Legal and Illegal RATs:
Legal:
* TeamViewer – Access any remote computer via Internet just like sitting in front of it – even through firewalls.
* UltraVNC – Remote support software for on demand remote computer support. VNC.Specializing in Remote Computer Support, goto my pc, goto assist, Remote Maintenance
* Ammyy Admin – Ammyy Admin is a highly reliable and very friendly tool for remote computer access. You can provide remote assistance, remote administration or remote
* Mikogo – Mikogo is an Online Meeting, Web Conferencing & Remote Support tool where you can share your screen with 10 participants in real-time over the Web.
Illegal:
* Spy-Net
* Cerberus Rat
* CyberGate Rat
* SubSeven
* Turkojan
* ProRat
Darkcomet

How do I use these RATs?
For the legal RATs, for example, TeamViewer, give the other party your ID and password (the one who is getting viewed gives the other the information). The other connection then puts the ID. You then have many options to choose from, which are self explanatory (once connected).
For the illegal Rats, you need to portforward it to listen onto a port. You then need to build a server, spread it to others, they run your program, and they’re infected.

How do I port forward?
Port forwarding is easy and important for an illegal RAT. You need open port because RAT connects through open port and bypass firewall. Open your web browser and write your IP and connect to your rooter (write Username: Admin & Password: Admin), open port forward page and write port you want and your IP. Well that’s all you need to do and now you got open port.

How do I control server?
Once installed, RAT server can be controlled via RAT client. From IP list box you choose PC and connect.
Where and how do I spread?
There are few different ways to spread your server. You can spread on warez websites, P2P file sharing websites (uTorrent, Pirate bay etc.), YouTube, etc. Some people use custom made Auto-Spreaders programs to spread their server.

What’s reverse Connection?
A reverse connection is usually used to bypass firewall restrictions on open ports. The most common way a reverse connection is used is to bypass firewall and Router security restrictions.

Whats Direct Connection?
A direct-connect RAT is a simple setup where the client connects to a single or multiple servers directly. Stable servers are multi-threaded, allowing for multiple clients to be connected, along with increased reliability.
FAQs (Frequently Asked Questions) about RATs

Q – Why my RAT server is detected by the most anti-virus software?
A – If you want to make your server FUD (Fully UnDetectable), you will need crypter. Also, you can hex edit your server, but be careful some servers can crash after hex editing.

Q – Can I get infected by using a RAT?
A – If the programmer that gives a download link to the RAT backdoors it (very possible), then yes. By simply downloading a file, you can be infected and vulnerable to many things. By using a legal rat, chances are you won’t be infected.

Q – How do I remove server if I infect myself?
A – When you infect yourself, first what you going to do is to connect to your PC. Some RATs have function to uninstall servers, well you click that and you uninstall it. There is another way, download MalwareBytes’ Anti-Malware and scan whole computer for trojans.

Q – Can I get traced when I rat somebody?
A – Yes and no. Depends on victim, it is really hard to remove infection or even trace a hacker. There are tools like WireShark, but it’s really hard to trace, because PC usually got over 300 connections. So don’t worry.

JPS VIRUS MAKER 3.0

You can make different types of viruses with the help of JPS…

JPS Virusmaker