Monday 24 June 2013

Secrets of Email Hacking - Keylogging and preventive measures taken against itkrazy2hacking

         Hi friends, Welcome to the " krazy2hacking  ". Guys, After surfing a lot on internet i did found that there is no complete and perfect tutorial on email hacking and preventive measures to safeguard yourself, they good but scattered throught the web. So, i decided to make all in one package                         

SECRETS OF EMAIL HACKING 

    
KEY FEATURES OF " SECRETS OF EMAIL HACKING " PACKAGE INCLUDES
  • Revealing all possible ways of hacking an email account one by one
  • Step by Step description with fully illustrated diagrams.
  • Download all hacking tools and anti-hacking softwares used in this tutorial for free.
  • Free download hacking ebook and other pdf guides.
  • Video demonstration on demand.
  • Make you aware of latest Internet scams and case studies.
Now a days Internet has been crowded by various methods of hacking an email account. A few of them work   but most of them are fake and are intented to fool you and steal your valuable money. Therefore the objective of this study package is to make you aware of various email hacking skills and steps to prevent you from these attacks. As we discussed that a verity of email hacking tricks are wide spread , In this package we will be discussing most commonly used hacking techniques , its pros and cons , truth behind them and lots more...
              KEYLOGGERS          [ EASY ]
                     Record the username and password instantly using both Software and
                     Hardware keyloggers.  
                
               EMAIL PASSWORD CRACKING SOFTWARE [ EASY ]
                      Hack passwords saved in web browsers , email clients etc and also truth
                      behind the online email password cracking softwares.
                             
   SECURITY QUESTION   [ AVERAGE ]
                      Ways to find details of victim. Answer the security question. Get password
                      reset link. Bypass security question and hack facebook account with
                      help of 3 friends. click here

               PHISHING  [ AVERAGE ]
                      Create your own phishing (fake page of a website) , and ask victim to log
                       into it. And his/her  username & password will be stored in another
                      file on your website. 
               COOKIE STEALING AND SESSION HIJACKING [ DIFFICULT ]
                       Web browser stores cookie to keep your session alive as you log in to
                       email sites. Ask your victim to click on the link via email or on chat .
                       Their cookie gets saved in a file on your site. Download the cookie script
                       and inject it into your browser and open the respective website, will take
                       you to victim's inbox without any password required.
               SNIFFING [ AVERAGE ]
                       Hacking into Lan or WiFi connected network, sniffing data passing
                       through the router. And hack victim's username and password.

If you find any other means of email hacking that has not been listed above. Share with us !!


         SECRETS OF EAIL HACKING : KEYLOGGING

Now a days, Everyone is asking how can i hack email account of my friend , x-girlfriend or x-boyfriend ? Is there any way to monitor what my children search for on internet? With whom they chat ? What do they talk about ?  Are they safe ? Do you feel your mate is cheating you? Do you want to keep an eye over your suspected clients. The Simplest Answer to your these question and lots other is Keylogging.


CASE STUDIES :

# In February 2006, the Brazilian police arrested 55 people involved in spreading malicious programs which were used to steal user information and passwords to banking systems. The keyloggers were activated when the users visited their banks’ websites, and secretly tracked and subsequently sent all data entered on these pages to cyber criminals. The total amount of money stolen from 200 client accounts at six of the country’s banks totaled $4.7million.

# On January 24, 2004 the notorious Mydoom worm caused a major epidemic and  broke the record previously set by Sobig, provoking the largest epidemic in Internet history to date. The worm used social engineering methods and organized a DoS attack on www.sco.com; the site was either unreachable or unstable for several months as a consequence. The worm left a Trojan on infected computers which was subsequently used to infect the victim machines with new modifications of the worm. The fact that MyDoom had a keylogging function to harvest credit card numbers was not widely publicized in the media

WHAT ARE KEYLOGGERS ?

The term keylogger itself describes its function i.e keylogger = key + logger. That means keylogger is either a software program or a hardware device which is used to record each and every key strokes ( includes all the keys you have typed even special characters) on the specified or infected computer. keyloggers present no threat to the system itself. But pose a serious threat to users, as they can be used to intercept passwords, pin codes , credit cards detail and other confidential information entered via the keyboard. Basically there are two classes of keyloggers namely Software keyloggers and Hardware Keyloggers.


SOFTWARE KEYLOGGERS

Software keyloggers are small spy software that is designed to secretly monitor and log all keystrokes, track user activity, saves the information to the user’s hard disk in text or html logs and then secretly forward it to the Attacker's inbox. Let's see an example

For example : A computer has been infected by a keylogger program. When the victim goes to http://gmail.com and types his “username” and the “password” in the respective fields to login on his computer. The keylogger silently records these keystrokes and stores them in the log file . These logs when opened up shows the captured “username” and “password” and also the respective website address ( Here Gmail ). These keyloggers can easily be configured to send these logs to attacker's email silently without knowledge and permission of Victim. And your victim got hacked!!

ADVANTAGES OF USING SOFTWARE KEYLOGGER
  • ABSOLUTELY INVISIBLE AND UNDETECTABLE : These keyloggers work completely in stealth mode i.e. they cannot be found in  list of installed programs , Task manager and even Add or Remove programs. So making it completely undetectable by user.
  • RECORD ALL PASSWORDS TYPED ON VICTIM'S PC : These Keyloggers are able to stores all alpha numeric , special characters ( like @ $ ! % * etc ), arrow keys,  Caps lock , Shift and Back Space and all other key press. So even victim tries to make a complex and unbreakable password, becomes useless. 
  • PASSWORD PROTECTION AND HOT KEY ACTIVATION :  Since these keyloggers work in stealth ( invisible ) mode, they need  a hot key combination to open e.g. [shift] + [Ctrl] + [f12] and sometimes even password to open it and for uninstallation too ( if set ).
  • TAKES SCREEN SHOTS OF DESKTOP AT FIXED INTERVAL OR PER CLICK AND SENDS TO THE ATTACKER
  • MONITOR MULTIPLE USER ACCOUNT ON A COMPUTER
  • AUTOMATICALLY STARTS WITH WINDOWS BOOT UP 
  • VIEW LOGS AND SCREEN SHOTS DIRECTLY IN YOUR INBOX 
  • COMES WITH REMOTE INSTALLATION FEATURE : There are many many keyloggers in the market which comes with remote installation feature i.e you can install the keylogger without having any physical access to victim's computer. The best keyloggers of this purpose are
                         
HOW TO REMOTELY INSTALL KEYLOGGER ON VICTIM'S COMPUTER ?


As we discussed earlier not all but a few keyloggers come with remote installation feature. But unfortunately these keyloggers don't come free. However I'm going to show you how to install these keyloggers having remote installation feature on victim's computer. In our case lets take the example of Sniper Spy. For even more detailed description and purchasing details visit their sites.
  •  After you purchase Sniperspy, you will have to create the remote installation module using easy set-up program which can be freely downloaded from sniper spy website. You need to email this module to the victim user as an attachment and wait for his /her click .
  • OR you can zip this module, upload this file on any download server like fileden.com ,ziddu.com and send the victim,  link to download this file on chat or send a fake mail.
 TIP : You can even bind this remote installation module with any image , pdf , flash games and then upload it. After the victim downloads and extracts *.zip file , he will find image, or game with which you binded the module . When user double clicks image or flash file, it will open up and your module will be installed in background silently . 
  • After the module has been installed silently, monitoring process will begin. The keystrokes captured will be uploaded to the SniperSpy servers continuously.
  • You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.

    DISADVANTAGES OF SOFTWARE KEYLOGGERS

    As I already mentioned that these keyloggers work completely in stealth mode i.e they are completely invisible due to their rootkit functionality. Therefore they behave almost as a trojan sending data ( Here logs containing keystrokes ) anonymously to the attacker. Due to this fact most Antivirus company have updated their database, adding signatures of these keyloggers . Hence It may be detected as a Virus or Trojan by your Antivirus.

                                  DOWNLOAD FULL VERSION KEYLOGGERS FOR FREE :




    PREVENTIVE MEASURES TO SAFEGUARD FROM SOFTWARE  KEYLOGGERS ATTACK 
    • Purchase any good antivirus, anyspyware and anti keyloggers on your computer and keep them updated to latest virus definition and signatures. like kaspersky , AVG
    • Download any Internet Security program to secure your online life from virus and worms spread throught the web. BIT DEFENDER FIREWALL , KASPERSKY INTERNET SECURITY etc
    • Avoid visiting the suspicious sites which promote porn as they could remotely install Trojans and virus having keylogging feature on your computer silently to seal your sensetive datas.
    • If you work on a Public computer then disable usb drives for preventing any one from installing malicious programs.
    • Use onscreen keyboard to enter your credentials on a form on any website. For example Type osk in run dialog box to activate On Screen Keyboad in windows, Install orca onscreen keyboard for linux.


    HARDWARE KEYLOGGERS

    Hardware keyloggers as name suggests are hardware devices which when plugged in between CPU and your Keyboard , starts recording the keystorkes in the internal flash , non volatile memory within the keylogger itself. Basically they contain a microcontroller, which interprets the datastream between the keyboard and CPU, processes it, and passes it to the non-volatile internal memory ( the stored data is not lost even when power is lost ) . These stored data can be retrived by typing a special password (you set before installation) on your text editor like notepad followed by " enter " .



    HOW DO THEY LOOK LIKE?

    Hardware keyloggers are usually black in colour ( to make it unnoticeable) and measure about 5cm in length.  They commonly have storage capacity ranging from 64KB to 4MB. A keylogger having 256KB of internal memory can record about 128 pages of text. These class of keyloggers are relatively more expensive than software keyloggers depending upon their internal memory.

    WHAT ARE THE BASIC STEPS TO INSTALL HARDWARE KEYLOGGERS ?
    Plug the keylogger into your system. Configure the keylogger correctly i.e. set up the password and put it in recording mode and follw these steps sequentially .
    • Unplug the victim's keyboard and plug the keylogger in between your CPU port and keyboard.
    • Keylogger is now ready to record any key press on victim's keyboard.
    • And most important, pray that victim doesn't notices it.

  • After installing the keylogger correctly , it looks like
  • Once the keylogger is plugged in, it will begin recording all keystrokes, even ones entered before the PC is in windows or whatever OS you use.


  • ADVANTAGES OF USING HARDWARE KEYLOGGERS
    • Hardware Keyloggers are independent of operating system installed on victim computer.
    • These keyloggers have no chance of being detected by any antivirus program.
    • It gets activated and starts recording the keystrokes the moment system is turned on, So it even stores your login , BIOS or harddisk password (if set).
    • Now they are available for both PS/2 and usb type keyboards.

    DISADVANTAGES OF USING HARDWARE KEYLOGGERS 
    • It becomes handy only if you have physical access to victims computer
    • If noticed by the victim , you will subsequently loose all stored data and your keylogger too.
    • It becomes more costly as you move for higher storage.

    HOW SHOULD I PURCHASE IT ?
    There are many manufacturers of hardware keyloggers. The one presented in this instructable is a 2MB Keyshark, which cost about US$60. .Try to find these hard ware keyloggers near your locality in a computer shop or you may place an order online on any website sell these keyloggers . The best place to find them is   eBay , Froogle , naaptol etc as many sites re-sell them for much more than they are worth. Just use Google to have a look, and you will find the same keylogger ranging from $60 to $90.\
  • PLEASE WRITE WHAT YOU WOULD LIKE TO SEE NEXT ON COMMENTS SECTION BELOW : 


  •     Do you like us ?

    • Follow us on facebook by clicking here and stay updated about latest hack on your facebook wall
    • Click here to receive our sms notification on your cell phones for free.
    • Have got something to share, email us on Gopalkarneedi@gmial.com along with your details and photograph to post on this site.

    THANKS FORYOUR VISIT


              

    10 comments:

    1. Have you ever been curious of what your partner, kids or employees are up to? You can now intercept cell phones, boost credit scores and hack any website remotely. All you need to do is contact a verified hacker Helpline: +1 (347)-857-7580 Email: extremeinfiltrators@gmail.com

      ReplyDelete

    2. I DONT KNOW WHAT YOU HAVE BEEN THROUGH OR HOW LONG YOU HAVE BEEN LOOKING BUT THIS IS THE LAST STOP AS THERE IS A HACKER WHO CAN HELP YOU WITH SPY WARE ON YOUR CHEATING PARTNER OR UPGRADE YOUR SCHOOL SCORES OR HELP WITH RESULT AND CLEAR ANY CRIMINAL RECORD..

      HACKING OF FACEBOOK , EMAIL , AND BANK ACCOUNTS ARE HIS SPECIALTY.. EMAIL : GREENFR1007@GMAIL.COM OR SKYPE:SATISH.ANCHAN4

      BEST EVER

      ReplyDelete
    3. If you need a real tutorial and procedure to hack your spouse or spy on his phone , email address contact: Netseverhack@gmail. com. he is also very good at bank account hacking, icloud, whatsapp, facebook, mobile phone, change school grade,erase criminal record, hack blank ATM card, hack email account?

      ReplyDelete
    4. If you think your spouse may be cheating, you can contact PHONESPYAPPS1@GMAIL.COM
      He’s a real hacker and was very reliable in helping me spy on my cheating husband’s cell phone remotely.

      ReplyDelete
    5. Great feed! Visit our website finessehackers.com if you need to hire a professional hacker for any type of cell phone or social network infiltration. Customer service and efficiency is top notch.

      ReplyDelete
    6. I never thought I will come in contact with a real and potential hacker until I knew   brillianthackers800 at Gmail and he delivered a professional job,he is intelligent and understanding to control jobs that comes his way
      Contact him and be happy

      ReplyDelete
    7. My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. I contacted a private investigator that linked me with onlineghost who took care of the hack job. He hacked his iPhone,Facebook,Instagram, Whats app, twitter and email account. I got all I wanted as proof . I”m glad i had a proven truth he was cheating . Contact him for any hack job. Tell him i referred you to him, he will surely meet your hack need. Contact: onlineghosthacker247@ gmail .com

      ReplyDelete
    8. Are you interested in the service of a hacker to get into a phone, facebook account, snapchat, Instagram, yahoo, Whatsapp, get verified on any social network account, increase your followers by any amount, bank wire and bank transfer. Contact him on= hackintechnology.com hackintechnology@gmail.com +12132951376

      ReplyDelete
    9. Contact hyperjeahacker@gmail.com If you need a professional hacker probably for hack into email accounts (Gmail,
      Yahoomail, Hotmail), bank accounts, blogs, database hack, keylogging, blank card, professional hacking into
      Institutional servers, firewall breaches, change of University grades, hack iPhones, Admin(staff) account
      hack -Access/Password (Facebook, Instagram, BBM, Skype, Snapchat, Twitter, Word Press, iCloud accounts etc.),
      credit cards for online transactions, tap into your spouse's phone to monitor calls and text message interception;
      then you should contact hyperjeahacker@gmail.com ; this is for those who actually require the services of a
      good hacker, I can definitely attest to how good and efficient they are, I owe my life right now to this team.
      They are very reliable and you can count on them. Glad to be of help

      ReplyDelete
    10. Do you need Personal Finance?
      Business Cash Finance?
      Unsecured Finance
      Fast and Simple Finance?
      Quick Application Process?
      Finance. Services Rendered include,
      *Debt Consolidation Finance
      *Business Finance Services
      *Personal Finance services Help
      contact us today and get the best lending service
      personal cash business cash just email us below
      Contact Us: financialserviceoffer876@gmail.com
      call or add us on what's app +918929509036

      ReplyDelete