Blogumulus by Roy Tanck and Amanda Fazani

Monday, August 8, 2011

Secrets of Email Hacking - Keylogging and preventive measures taken against it

Print Friendly and PDF

Hi friends, Welcome to the " krazzy2hack  ". Guys, After surfing a lot on internet i did found that there is no complete and perfect tutorial on email hacking and preventive measures to safeguard yourself, they good but scattered throught the web. So, i decided to make all in one package of

   
      
             SECRETS OF EMAIL HACKING 



    
KEY FEATURES OF " SECRETS OF EMAIL HACKING " PACKAGE INCLUDES
  • Revealing all possible ways of hacking an email account one by one
  • Step by Step description with fully illustrated diagrams.
  • Download all hacking tools and anti-hacking softwares used in this tutorial for free.
  • Free download hacking ebook and other pdf guides.
  • Video demonstration on demand.
  • Make you aware of latest Internet scams and case studies.
Now a days Internet has been crowded by various methods of hacking an email account. A few of them work   but most of them are fake and are intented to fool you and steal your valuable money. Therefore the objective of this study package is to make you aware of various email hacking skills and steps to prevent you from these attacks. As we discussed that a verity of email hacking tricks are wide spread , In this package we will be discussing most commonly used hacking techniques , its pros and cons , truth behind them and lots more...
              KEYLOGGERS          [ EASY ]
                     Record the username and password instantly using both Software and
                     Hardware keyloggers.  
                
               EMAIL PASSWORD CRACKING SOFTWARE [ EASY ]
                      Hack passwords saved in web browsers , email clients etc and also truth
                      behind the online email password cracking softwares.
               SECURITY QUESTION   [ AVERAGE ]
                      Ways to find details of victim. Answer the security question. Get password
                      reset link. Bypass security question and hack facebook account with
                      help of 3 friends. click here

               PHISHING  [ AVERAGE ]
                      Create your own phishing (fake page of a website) , and ask victim to log
                       into it. And his/her  username & password will be stored in another
                      file on your website. 
               COOKIE STEALING AND SESSION HIJACKING [ DIFFICULT ]
                       Web browser stores cookie to keep your session alive as you log in to
                       email sites. Ask your victim to click on the link via email or on chat .
                       Their cookie gets saved in a file on your site. Download the cookie script
                       and inject it into your browser and open the respective website, will take
                       you to victim's inbox without any password required.
               SNIFFING [ AVERAGE ]
                       Hacking into Lan or WiFi connected network, sniffing data passing
                       through the router. And hack victim's username and password.

If you find any other means of email hacking that has not been listed above. Share with us !!

 
         SECRETS OF EAIL HACKING : KEYLOGGING

Now a days, Everyone is asking how can i hack email account of my friend , x-girlfriend or x-boyfriend ? Is there any way to monitor what my children search for on internet? With whom they chat ? What do they talk about ?  Are they safe ? Do you feel your mate is cheating you? Do you want to keep an eye over your suspected clients. The Simplest Answer to your these question and lots other is Keylogging.


CASE STUDIES :

# In February 2006, the Brazilian police arrested 55 people involved in spreading malicious programs which were used to steal user information and passwords to banking systems. The keyloggers were activated when the users visited their banks’ websites, and secretly tracked and subsequently sent all data entered on these pages to cyber criminals. The total amount of money stolen from 200 client accounts at six of the country’s banks totaled $4.7million.

# On January 24, 2004 the notorious Mydoom worm caused a major epidemic and  broke the record previously set by Sobig, provoking the largest epidemic in Internet history to date. The worm used social engineering methods and organized a DoS attack on www.sco.com; the site was either unreachable or unstable for several months as a consequence. The worm left a Trojan on infected computers which was subsequently used to infect the victim machines with new modifications of the worm. The fact that MyDoom had a keylogging function to harvest credit card numbers was not widely publicized in the media


WHAT ARE KEYLOGGERS ?


The term keylogger itself describes its function i.e keylogger = key + logger. That means keylogger is either a software program or a hardware device which is used to record each and every key strokes ( includes all the keys you have typed even special characters) on the specified or infected computer. keyloggers present no threat to the system itself. But pose a serious threat to users, as they can be used to intercept passwords, pin codes , credit cards detail and other confidential information entered via the keyboard. Basically there are two classes of keyloggers namely Software keyloggers and Hardware Keyloggers.









SOFTWARE KEYLOGGERS

Software keyloggers are small spy software that is designed to secretly monitor and log all keystrokes, track user activity, saves the information to the user’s hard disk in text or html logs and then secretly forward it to the Attacker's inbox. Let's see an example


 


For example : A computer has been infected by a keylogger program. When the victim goes to http://gmail.com and types his “username” and the “password” in the respective fields to login on his computer. The keylogger silently records these keystrokes and stores them in the log file . These logs when opened up shows the captured “username” and “password” and also the respective website address ( Here Gmail ). These keyloggers can easily be configured to send these logs to attacker's email silently without knowledge and permission of Victim. And your victim got hacked!!

ADVANTAGES OF USING SOFTWARE KEYLOGGER
  • ABSOLUTELY INVISIBLE AND UNDETECTABLE : These keyloggers work completely in stealth mode i.e. they cannot be found in  list of installed programs , Task manager and even Add or Remove programs. So making it completely undetectable by user.
  • RECORD ALL PASSWORDS TYPED ON VICTIM'S PC : These Keyloggers are able to stores all alpha numeric , special characters ( like @ $ ! % * etc ), arrow keys,  Caps lock , Shift and Back Space and all other key press. So even victim tries to make a complex and unbreakable password, becomes useless. 
  • PASSWORD PROTECTION AND HOT KEY ACTIVATION :  Since these keyloggers work in stealth ( invisible ) mode, they need  a hot key combination to open e.g. [shift] + [Ctrl] + [f12] and sometimes even password to open it and for uninstallation too ( if set ).
  • TAKES SCREEN SHOTS OF DESKTOP AT FIXED INTERVAL OR PER CLICK AND SENDS TO THE ATTACKER
  • MONITOR MULTIPLE USER ACCOUNT ON A COMPUTER
  • AUTOMATICALLY STARTS WITH WINDOWS BOOT UP 
  • VIEW LOGS AND SCREEN SHOTS DIRECTLY IN YOUR INBOX 
  • COMES WITH REMOTE INSTALLATION FEATURE : There are many many keyloggers in the market which comes with remote installation feature i.e you can install the keylogger without having any physical access to victim's computer. The best keyloggers of this purpose are
                        
    sniper spy
    Win spy keylogger


    HOW TO REMOTELY INSTALL KEYLOGGER ON VICTIM'S COMPUTER ?

    As we discussed earlier not all but a few keyloggers come with remote installation feature. But unfortunately these keyloggers don't come free. However I'm going to show you how to install these keyloggers having remote installation feature on victim's computer. In our case lets take the example of Sniper Spy. For even more detailed description and purchasing details visit their sites.
    •  After you purchase Sniperspy, you will have to create the remote installation module using easy set-up program which can be freely downloaded from sniper spy website. You need to email this module to the victim user as an attachment and wait for his /her click .
    • OR you can zip this module, upload this file on any download server like fileden.com , ziddu.com and send the victim,  link to download this file on chat or send a fake mail.
     TIP : You can even bind this remote installation module with any image , pdf , flash games and then upload it. After the victim downloads and extracts *.zip file , he will find image, or game with which you binded the module . When user double clicks image or flash file, it will open up and your module will be installed in background silently
    • After the module has been installed silently, monitoring process will begin. The keystrokes captured will be uploaded to the SniperSpy servers continuously.
    • You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

      DISADVANTAGES OF SOFTWARE KEYLOGGERS


      As I already mentioned that these keyloggers work completely in stealth mode i.e they are completely invisible due to their rootkit functionality. Therefore they behave almost as a trojan sending data ( Here logs containing keystrokes ) anonymously to the attacker. Due to this fact most Antivirus company have updated their database, adding signatures of these keyloggers . Hence It may be detected as a Virus or Trojan by your Antivirus.




      DOWNLOAD FULL VERSION KEYLOGGERS FOR FREE :


      Download Golden Eye keylogger with serial key FREE
      Download Golden keylogger + serial for free
      Free Download KBG Keylogger 4.5.4 with serial
      Download Perfect Keylogger with serial key for free
      Download REFOG Keylogger with serial key for free






      Free Download Elite Keylogger with serial key
         
      Download Free Ardamax Keylogger with serial
       

      PREVENTIVE MEASURES TO SAFEGUARD FROM SOFTWARE  KEYLOGGERS ATTACK
      • Purchase any good antivirus, anyspyware and anti keyloggers on your computer and keep them updated to latest virus definition and signatures. like kaspersky , AVG
      • Download any Internet Security program to secure your online life from virus and worms spread throught the web. BIT DEFENDER FIREWALL , KASPERSKY INTERNET SECURITY etc
      • Avoid visiting the suspicious sites which promote porn as they could remotely install Trojans and virus having keylogging feature on your computer silently to seal your sensetive datas.
      • If you work on a Public computer then disable usb drives for preventing any one from installing malicious programs.
      • Use onscreen keyboard to enter your credentials on a form on any website. For example Type osk in run dialog box to activate On Screen Keyboad in windows, Install orca onscreen keyboard for linux.


      HARDWARE KEYLOGGERS

      Hardware keyloggers as name suggests are hardware devices which when plugged in between CPU and your Keyboard , starts recording the keystorkes in the internal flash , non volatile memory within the keylogger itself. Basically they contain a microcontroller, which interprets the datastream between the keyboard and CPU, processes it, and passes it to the non-volatile internal memory ( the stored data is not lost even when power is lost ) . These stored data can be retrived by typing a special password (you set before installation) on your text editor like notepad followed by " enter " .



      HOW DO THEY LOOK LIKE?

      Hardware keyloggers are usually black in colour ( to make it unnoticeable) and measure about 5cm in length.  They commonly have storage capacity ranging from 64KB to 4MB. A keylogger having 256KB of internal memory can record about 128 pages of text. These class of keyloggers are relatively more expensive than software keyloggers depending upon their internal memory.




      WHAT ARE THE BASIC STEPS TO INSTALL HARDWARE KEYLOGGERS ?
      Plug the keylogger into your system. Configure the keylogger correctly i.e. set up the password and put it in recording mode and follw these steps sequentially .
      • Unplug the victim's keyboard and plug the keylogger in between your CPU port and keyboard.
      • Keylogger is now ready to record any key press on victim's keyboard.
      • And most important, pray that victim doesn't notices it.



      • After installing the keylogger correctly , it looks like
      • Once the keylogger is plugged in, it will begin recording all keystrokes, even ones entered before the PC is in windows or whatever OS you use.
         



      ADVANTAGES OF USING HARDWARE KEYLOGGERS
      • Hardware Keyloggers are independent of operating system installed on victim computer.
      • These keyloggers have no chance of being detected by any antivirus program.
      • It gets activated and starts recording the keystrokes the moment system is turned on, So it even stores your login , BIOS or harddisk password (if set).
      • Now they are available for both PS/2 and usb type keyboards.

      DISADVANTAGES OF USING HARDWARE KEYLOGGERS
      • It becomes handy only if you have physical access to victims computer
      • If noticed by the victim , you will subsequently loose all stored data and your keylogger too.
      • It becomes more costly as you move for higher storage.

      HOW SHOULD I PURCHASE IT ?
      There are many manufacturers of hardware keyloggers. The one presented in this instructable is a 2MB Keyshark, which cost about US$60. .Try to find these hard ware keyloggers near your locality in a computer shop or you may place an order online on any website sell these keyloggers . The best place to find them is   eBay , Froogle , naaptol etc as many sites re-sell them for much more than they are worth. Just use Google to have a look, and you will find the same keylogger ranging from $60 to $90.








      PREVENTIVE MEASURES TO SAFEGUARD FROM HARDWARE KEYLOGGERS ATTACK

      • Avoid suspicious people from accessing your computer.
      • Keep an eye for any unknown device being connected to your computer.


           
       
      PLEASE WRITE WHAT YOU WOULD LIKE TO SEE NEXT ON COMMENTS SECTION BELOW :





          Do you like us ?

      • Follow us on facebook by clicking here and stay updated about latest hack on your facebook wall
      • Click here to receive our sms notification on your cell phones for free.
      • Have got something to share, email us on rukrazzy2hack@gmail.com along with your details and photograph to post on this site. 




             THANKS FOR YOUR VISIT  





      LATEST FEEDS FROM THIS BLOG

      krazzy2hack
       

      © Copyright 2009 krazzy2hack