Showing posts with label Keyloggers. Show all posts
Showing posts with label Keyloggers. Show all posts

Feb 12, 2011

Keyloggers - Counter Measures

In my previous post i explained how a keylogger works.... . Now i am going to show you how to prevent from being keylogged

1-Use a Good Antivirus
This is the first and basic step that you need to take in order to protect your computer from keyloggers. Use a Good antivirus such as  and update it regularly.

2-Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Over past few years. There are many antiloggers available BUTI have found Zemana Antilogger as the best antilogger.

Zemana
Normally a keylogger can be easily detected by a Good Antivirus program, but hackers use some methods such as hexing, binding, crypting and similar techniques to make it harder to be detected by antivirus programs. In this case Zemana Antilogger comes handy as the program is specially developed to protect your system against harmful keyloggers.



Sandboxie

Sandboxieis another great program to help you protect your computer against harmful keyloggers.
When ever you receive a file that looks suspicious, just run the program with Sandboxie so even if it is a keylogger or any other virus it will not make permanent changes to your computer system.

To run a program in Sandboxie follow the steps as mentioned below:
1. Open sandboxie and click on sandbox menu on the top
2. Now goto Default sandbox
3. Then click on run any program
4. Now select the file you wish to run in sandboxie and click open

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 170 applications..

                                                         Happy Hacking








How to use Keyloggers – Detailed Tutorial

This is a DETAILED tutorial to tell you all possible information about Keylogger & Keylogging .
Note-I highly recommend that you read this post completely since every single piece of information is important
1. What is a Keylogger?
A keylogger is also called a spysoftware is a small program that records each and every keystroke a user types on a specific computer’s keyboard. A keylogger program canb e installed or attached in computer just in a few seconds and once installed you are only a step away from getting the victim’s password.

2. How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to www.gmail.com and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the gmail login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke. Some keyloggers also give a screen-shot of Your computer background.

3-Types of Keyloggers.
1-Hardware Keylogger - A plug-in device or a hardware circuit can be used as keylogger tools. Either of the two can log to their internal memories all of a user’s keyboard activities.
2-Software Keylogger- The software keylogger needs to be installed on the Victims computer to work

4-Once I install the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his/her computer. This is because, once installed the keylogger will run in total stealth mode. Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his/her PC.But if the Victim is Wise he may run a system scan or he may also see the process then he rocks and you are fool

5- Can I be traced back if I install the keylogger on some other computer?

No, For a Man with no knowledge about computer and keylogger or even a man who know;s this cannot trace you back. But in my case I can trace keyloggers :P

6-Which keylogger is the best?

Number of keyloggers are available but the best I used till now for me is Ardamax Keylogger.

◄◄~~ARDAMAX TUTORIAL~~


I am using my virtual Os for Making this tutorial.

Serial
Name:   ONY wuz here!
Serial: ABKRRPKWTLEFWCL

Download The Ardamax Keylogger 2.85 here

I. Installing and registering 
1. Once you’ve downloaded and installed it, you’ll see a little notepad icon in your taskbar.


2-.Now right-hand click it and click ‘Enter registration key….


3-Enter the Name and password in the box fields


4.Once done click ‘Ok’ and you should get a pop-up saying ‘Registration code is accepted. Thank you for registration!’
II. Creating the Keylogger Remote file:
1. Now your going to make the Keylogger Remote file (The thing you give to your victim). Click ‘Remote Installation…’,
click ‘Next’
2.Now,you should see this.

3.If you want to bind Keylogger Remote file with another application or file click the box that says ‘Append keylogger Remote file to file or another application’ and browse file or application that you want to bind it with..  I would prefer to skip this and bind the keylogger after creating the remote file.

4. Now click ‘Additional components’ and tick ‘Installation Package Bilder’ like done in the screenshot.

 5.Now you should be at ‘Invisibility’, make sure all the boxes are ticked, then click ‘Next’.

6. Now you should be at ‘Security’, click ‘Enable’ and put your password (it can be any password you like, make it something easy so you can remember). Once done, make sure all the boxes are ticked and click ‘Next’.. Or else SkIp this also


7-untik the update optiong




8. Ok, you should now be at ‘Options’, use setting like done in screenshots.You can also select it destruction date


9. Ok, now you should be at ‘Control’, click the box that says ‘Send logs every’, now make it so it sends logs every 20 minutes, then where it says ‘Delivery’, un-tick ‘Email’ and tick ‘FTP’, then where it says ‘Include’ un-tick ‘Screenshots’, now un-tick the box where it says ‘Send only if log size exceeds’, once thats done, it should all look like it does in this screenshot:
10. Now you should be at ‘FTP’, create a free account at http://www.drivehq.com/secure/FreeSignup…om=storage, then make sure your at ‘Online Storage’, then make a new folder called: Logs (this is where the logs are sent to when you keylogg someone), Now on your FTP on Ardamax Keylogger, where it says ‘FTP Host:’, put this:
FTP.DriveHQ.com
Now where it says ‘Remote Folder:’, put this: Logs
Now where it says ‘Userame:’ and ‘Password:’, put your DriveHQ username and password, then it should look something like this:

 Now Click ‘Test’ and it should pop up like this:
 If not then see if the password and username is right.

Once done, do NOT change your DriveHQ password or rename/delete the folder called ‘Logs’, if you do, the logs will not come through.

11. You should now be at ‘Control’, un-tick ‘Enable Screenshots Capturing’ then click ‘Next’.


12. Now you can change name and icon your Keylogger Engine as you want it to look like.
 
just click ‘Finish’.
13.After you click ‘Finish’ you should see this:

Now Your Remote File Is Created 

Happy hacking

Example Of a Hardware Keylogger 


Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More