how to use keylogger

Document Sample
how to use keylogger Powered By Docstoc
					Today I gonna tell u hw to use keyloggers

download new keylogger this nt detectable with antivirus

>download link --

All spy keylogger 4.3 -

Crack -

>Then install it with ftp setting:

Now you should be at 'FTP', ok, creat a free account at, then make sure your
at 'Online Storage', then make a new folder called: Logs (this is where the logs are sent to
when you keylogg someone)

Now on your FTP on Ardamax Keylogger, where it says 'FTP Host:', put this:

Now where it says 'Remote Folder:', put this: Logs

Now where it says 'Userame:' and 'Password:', put your DriveHQ username and password

Once done, do NOT change your DriveHQ password or rename/delete the folder called
'Logs', if you do, the logs will not come through.

You should now be at 'Control', make sure all the boxes are 'ticked' then click 'Next'.

Where it says 'Screen Shots', adjust them as you like, but I recommend every 2 hours and
full screen, once done click 'Next'.
Now you should be at 'Destination', now you have to choose where you put your Keylogger
Engine, where it says 'Keylogger egine

path:', click 'browse' and choose where you want to put your Keylogger Engine (I suggest
'My Documents').

Now un-tick 'Open the folder containing the keylogger engine' (this should stop you from
logging yourself) and then choose the Icon

you want for the keylogger engine, choose one and then click 'Next' then 'Finish'.

How to send keylogger

Binding the Keylogger Engine with another file.

1. Download the Binding Tool:

Easy Binder 2.0

2. Open it and then click the little green '+' image in the bottom left corner, then it should
browse your files, go to 'My Documents'

(or where-ever you put the Keylogger Engine) and then click the file called 'Install'.

3. Do the same again but don't add the Keylogger Engine (Install), add a picture or

4. You need to get a .ico image, this is easy, just go to
kit/services/favicon/ and upload the Image you want to be converted to .ico, once its done,
click 'download'.
5. On the Binder, click 'Settings' and then where it says 'Select An Icon', click the '...' image
and then browse your files, where it says 'Files of type', scroll down and select 'All Files
[*.*]', then select your .ico image which you just made like so;

6. Now on the Easy Binder, where it says 'Set Output File', click the '...' button and then
put it where you want your binded files to be saved (I recommend My Documents so you
don't forget), put the name you want on the file and then click 'Save'.

This tutorial is for those of you who DONT know how to recieve log files from your
keyloggers such as All Spy Keylogger, Ardamax etc....

FTP is like an online storage account. You make one so that your keylogger can send you
log files there and you can download those log files and view them from where ever you are

The best ftp site according to me is

1) Goto this site, and click on the sign up button in first section where it says "Online File
Storage and Sharing"

Description: Hacking website using SQL Injection -step by step guide Before we see what SQL Injection is. We should know what SQL and Database are. Database: Database is collection of data. In website point of view, database is used for storing user ids,passwords,web page details and more. Some List of Database are: * DB servers, * MySQL(Open source), * MSSQL, * MS-ACCESS, * Oracle, * Postgre SQL(open source), * SQLite, SQL: Structured Query Language is Known as SQL. In order to communicate with the Database ,we are using SQL query. We are querying the database so it is called as Query language. Definition from Complete reference: SQL is a tool for organizing, managing, and retrieving data stored by a computer database. The name "SQL" is an abbreviation for Structured Query Language. For historical reasons, SQL is usually pronounced "sequel," but the alternate pronunciation "S.Q.L." is also used. As the name implies, SQL is a computer language that you use to interact with a database. In fact, SQL works with one specific type of database, called a relational database. Simple Basic Queries for SQL: Select * from table_name : this statement is used for showing the content of tables including column name. For eg: select * from users; Insert into table_name(column_names,...) values(corresponding values for columns): For inserting data to table. For eg: insert into users(username,userid) values("blackstar","black"); I will give more detail and query in my next thread about the SQL QUERY. What is SQL Injection? SQL injection is Common and famous method of hacking at present . Using this method an unauthorized person can access the database of the website. Attacker can get all details from the Database. What an attacker can do? * ByPassing Logins * Accessing secret data * Modifying contents of website * Shutting down the My SQL server Now let's dive into the real procedure for the SQL Injection. Follow my steps. Step 1: Finding Vulnerable Website: Our best partner for