Tuesday 7 February 2012

What Are Keystroke Loggers (Keyloggers)?

What Are Keystroke Loggers (Keyloggers)? 
A Keystroke logger (also known as a Keylogger) is a program, usually ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by the keylogger somewhere in secret. These can be attached to other executable so you never even know you ran them in the first place, once you click it once it often is started at start up from their on.

There are two main types of keystroke loggers:

1. Software based, and
2. Hardware based

Software based keyloggers

These are software programs designed to work on the target computer’s operating system. Once the software is installed on the target’s computer, it captures every key pressed on the keyboard and stores it down in a file or memory-bank that can be viewed by the person performing the monitoring in real-time, or at a later date.

There is also a type of remote access software keyloggers. This is a process of creating server keylogger and then sending this server.exe file to the victim. Once the keylogger server is installed on the victim’s computer, all text and passwords typed on his computer are sent to you in your email inbox by this server created using keylogger.

Also, server keyloggers are detected by antiviruses. So, you need to have FUD (Fully UnDetectable) keylogger so that victim computer’s antivirus will not detect your sent server keylogger as virus and prevent it from being deleted.

What do you need to use a Remote Keylogger?

* Accounts to send the Logs to

The most used Method’s of sending logs is Gmail and FTP. For gmail go to goole.com and make a Gmail account and for FTP use a free web hosting provider, like t35.com

* A Keylogger Builder

A Keylogger Builder’s are very easy for you to get your hands on one. There are many keylogger builders that you can use, but they will all be detected by anti-virus or UD (Undetectable). UD Keylogger means that some anti-virus software will detect it and aleart the victim telling him that it is a virus and it will be deleted from his system. What you really want is a FUD Keylogger (Fully Undetactable). That means no anti-virus software will alert the victim saying its a virus. There are very few FUD Keyloggers on web and the most of the time you need to buy a keylogger that will be FUD for a long time. They normally cost about 3$-20$, depending on the functions of the Builder.

Hardware based keyloggers

Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.

The tiny size and ideal location ensures it almost never gets found; and if it does get found, nobody would necessarily know what it was anyway! You can set it up so you can get the data in another location and you don’t need to be able to log on to the person’s machine to install it successfully
Which type you use depends entirely up to you, the capabilities you have (whether or not you can access the machine) and what kind of data you need. Either way, keyloggers are powerful tools that can pay huge dividends in protecting your home and business. 
This Post Is Copied from this forum.

20 reasons why my keyloggers or stealers not work on Victim pc

Many of you might have tried many stealers and keyloggers to get logs of your customer.
You might have registered on various FTP, PHP sites or even emails to test and get logs of your customers.
Well, if you are not getting logs that doesn’t mean Stealer or Keylogger is not good or hosting site is bad.
There are various reasons why people don’t receive logs many times.
I will discuss some of the reasons, which I know. If you know more than these, please feel free to Comment

Reason 1:
You might have entered wrong FTP, PHP info. This is because many people don’t know how to put right PHP or FTP info into Stealer or Keylogger.
Reason 2: 
May be your firewall is blocking access to your file.
If your customer has powerful firewall (like ZoneAlarm, Outpost etc…), then it WILL suspect some suspicious behavior and pop-up Internet access privilege. If your customer is smart enough, then he/she may block access to your file.

Reason 3:
You never know who is downloading your file (EXE). If the user is capable enough to ollydbg your file, he may easily get your FTP info (if file is not hardly crypted). If the user is smart enough, he may VMWare or Sandbox ur file and may delete ur file after seeing such external access info.
Reason 4:
Many Stealers or Keyloggers use UDP connection instead of TCP, for example Stealer2600.
UDP is very much unreliable as compared to TCP. So, UDP doesn’t provide error checksum or resending of data. If ur Stealer or Keylogger is using TCP connection, then its much better.
Reason 5:
Sometimes it may happen that FTP or PHP host is down for some reasons (like backup or upgradation etc…). At that time, ur stealer will send info to the host, but as the host is down, u won’t get logs.
Reason 6:
If your Stealer or Keylogger is FUD, say today on 10 March. It may become detected on 14th or 14th of March. You may never know. So, it won’t be FUD anymore and AV’s will delete it or may be Firewall will block access to your file.
Reason 7:
If your customer has powerful AV’s like Kaspersky, Avast, Nod etc…, they have Heutistic scanning. This may also prevent file from opening.
If ur exe is anti-Kaspersky or such like that, then well and good.
Reason 8:
Make sure your EXE is FUD and with many Anti-methods like anti-anubis, anti-sandbox, anti-VMWare, anti-debugger, anti-emulator, anti-sunbelt etc… (There are hell lot of anti-methods, i just explained a few)…
If ur exe is not anti with any of the above methods, then it may get detected, even by a n00b icon razz 20 Reasons Why Peoples dont Receive Logs via Stealer or Keylogger
Reason 9:
Sometimes, while stealer is sending logs to ur FTP or PHP, some packets may lost while traveling to ur host. This is because of many reasons, like network congestion or bottleneck problems, etc…
Reason 10:
Sometimes, your host gets too busy and might come under very much pressure. So, it may stop responding and may not collect logs.
Reason 11:
Once you have distributed ur EXE and if ur using FTP acc to get logs, and then if change pass of ur FTP acc, then also ur exe will not send logs.
This is coz, suppose say, ur ftp login info is username: “hello” and password is: “123456″. This is info is stored in ur exe and u distributed that. While uploading, ur exe will use the above info to upload logs to ur FTP.
If u change the password to “456789″, then u know that u hv changed the password of ur FTP acc, but ur EXE doesn’t know this. It will use the password as “123456″. So, in this case also you won’t receive logs.
Reasons 12:
Your Stealer or keylogger is a man-made software. It also requires maintenance and upgradation. Over a period of time, its may performance may decrease. This is also the reason of not receiving logs. But this happens very rarely, only if ur sticked to the same stealer for 2 years or more.
Reason 13:
Next reason is may be your crypter/binder/packer. If ur crypter does not support the stealer or keylogger which ur using, then it may corrupt ur exe.
So, choose the stealer and crypter combination wisely.
Reason 14:
Another reason is an operating system. Suppose say, ur stealer or keylogger is configured to run on XP SP1, SP2, SP3, NT, 2k and Vista.
If ur customers is using Windows 7, then obviously ur exe will not run on his PC as it can’t understand how to execute.
Reason 15:
Another reason cud be 32-bit and 64-bit. If stealer or keylogger is configured to run only on 32-bit machines, then on 64-bit machines, it may not work, even if ur using XP and stealer is compatible with XP.
Reason 16:
If you dun have good crypter and if ur FUDing ur file manually via Hexing, then make sure that u know proper hexing. Don’t just go on google or on some forums and find hexing solution on FUDing ur file. You WILL corrupt ur EXE if ur dun understand offset and other terms…
Using tutorial on hexing is a good choice but dun apply ur own logic with that hex tut if u don’t hexing.
Also, dun combine one hex tutorial with another hex tutorial.
This will definitely corrupt ur file.
Reason 17:
If ur customer doesn’t have stored passwords in his browser, then also stealer will not send logs or it will send empty logs.
Reason 18:
Say, ur customer is using Google chrome and storing passwords in it. If ur stealer is not configured to steal passwords from chrome, then also u won’t receive logs.
So, choose a stealer which have good combination of browser (FF, IE, etc…)
Reason 19:
Suppose ur EXE is FUD and is less than 20MB and if ur customers scans ur EXE under virustotal, or jotti, then ur EXE will get detected by many AV’s and within few days, it will get detected easily and AV’ will delete it.
Reason 20:
Even if ur EXE is 0/24 (FUD) on NVT, but if ur customers scans ur exe under Anubis, then mostly Anubis will show all the info after executing ur exe. This may alert ur customer and he may delete ur file.

How to Know If Hacker Attack on your pc/ you are infected with Rat or keylogger

How to Know If Hacker Attack on your pc/ you are infected with Rat or keylogger 

1.Open command prompt and type netstat -b


Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.
Look out for SYN Packets and the Foreign address its been connecting with , check the process its been associated with, check the ports also. If you find that its connecting to some unknown ports, then you can say you have been backdoored.
2. Go to your task manager. On the top of it, click on View—> select Column—> Tick on PID (Process Identifier).
Match the suspicious Process with the Processes In task manager, check PID also.
Now most of the RATs resides on Start up. How to delete them from start up?
a) Go to regedit —> HKLMSoftwareMicrosoftWindowsCurrent versionRun
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at
HKCUSoftwareMicrosoftWindowsCurrent VersionRun
OR
Open Cmd prompt & type start msconfig. Go to Startup tab, you can check the startup process there.

Wednesday 1 February 2012

Sms Bomber

Sms Bomber
Download free sms bomber and send free unlimited sms anywhere in the world


Tuesday 31 January 2012

Softpedia Editor's Review for eXtreme Movie Manager




eXtreme Movie Manager is a powerful movie database manager that lets you organize your collection by letting you enter information manually or retrieve details from the Internet.

Besides the fact that it works with the most popular video formats on the market, such as DivX, XviD, VHS, DVD, VCD, SVHS or DVD-R, eXtreme Movie Manager comes with dedicated tools to allow you to write down information about actors or import covers and photos.

There are multiple ways to add a new movie to the collection and the easy to navigate interface lets you do it with ease straight from the main window. 

You can add boxsets, do it manually by title or automatically from the Internet, add movies from CD or DVD, scan the local disks for movies, add movies from TXT files or import movies UPC/EAN codes from a text file.

The number of features is absolutely amazing and you may need a few minutes to get used to the professional-looking interface, but you're also allowed to add shows manually by title, from a TXT list, from the hard disk or again, automatically from the Internet.

The download tool works quick and easy and retrieves details such as actors and crew, images, DVD details and even trailers.

Of course, the application is able to scan the video files you choose and extract information to be saved in the collection, such as bitrate, audio and video quality, codecs and screen resolution.

Additionally, eXtreme Movie Manager has special utilities to cut frames from the movie and thus create a preview that can be attached to a certain title.

Just as expected, the program boasts a powerful export tool, which means the whole collection can be saved in multiple formats, such as CSV, TXT and HTML.

All in all, eXtreme Movie Manager is a powerful and affordable way to organize your movie collection, offering a professional-looking interface and advanced tools to help your in this regard.




Heroes of Newerth - Hero Spotlight - Berzerker

 Heroes of Newerth - Hero Spotlight - Berzerker

In this new Heroes of Newerth trailer you will get to view some new gameplay footage featuring a new in-game character, Berzerker. Sit back and enjoy the video!