Posts

Showing posts from January, 2012

Basic Guide To Remote Keyloggers

Image
Today we will consider another basic hacking technique called keylogging.  Keylogging certainly is extensively used for hacking password of facebook, twitter and even bank accounts. Keylogger is a small program that runs in stealth mode in victim’s computer and record each and every keystroke typed by user, including login information (ids and passwords). Remote keylogger is a keylogger that sends logs to the hacker via email or ftp. As there are number of keyloggers out there and most of them are pretty easy to use, keylogging wouldn’t have been a tiring task if antivirus didn’t exist, but unfortunately they do, so we need to have a strategy to fool and bypass antivirus, these strategies we will discuss later.

Sending Fake Mail/MAIL FORGERY/MAIL SPOOFING

Image
Ever thought of having freedom to send mail from any email id? Fortunately this is possible and very easy to perform. Mail spoofing is performed by manipulating the ‘email header’ of an email in such a way that it looks like sent from a legit user of email and not from the original sender. E-Mail spoofing is possible because SMTP(protocol used to send E-mail) does not provide a mechanism for authentication of email sender.   In this post I will teach you how to create your own email forge, well if you want to send forge mail without getting deep into the internals still you can send mail by using these sites - http://www.emkei.cz/ - http://anonymizer.in/fake-mailer/ -Ask google for more  But for true geeks we will go deep and create our own email forger, which will help us understand the working in a better way and hence will get more interesting. Let’s begin -First of all you need to create an account in a free file hosting site (I recommend http://www.000...

PHISHING-Hacking Facebook!

Image
Hey! Today I will show you how phishing attacks are performed. Phishing (not fishing) is one of the easiest and popular email hacking techniques used by hackers. All you need is some good social engineering skills and a stupid victim (yes, if the victim is too smart he won’t get hacked). How phishing is performed? To perform phishing, the hacker creates a fake login page of the website whose account he wants to hack ,to demonstrate we will create a fake login page of   Facebook . Now the hacker has to make the victim login to that fake page which looks exactly similar to the actual facebook login page, the victim misinterpret fake page with the original  login page of facebook and enters his credentials that’s how his account gets hacked.   Let’s roll… Here begins the action, download this  tool kit and extract it in a folder using winrar, please note here you have these files        1.  a.php      2....