Quote:
Originally posted by newton014@Mar 11 2006, 22:02
Ok, I dont get how to edit or anything...and plus..how do u use a keylogger??
|
how do u use a keylogger?
is not the right question, cause i would answer: by configuring it an sending the server executable to the victom...
but probably u wouldnt understand anything of that.
so think before u just ask somethin.
what do u actually need to know first is what is a keylogger and what does it exactly do?
what are the advantages and disadvantages?
see those are questions where the answer is useable. ill try to answer some..
what is a keylogger?
- a small program that sends keys pressed on another computer and sends it to yours.
most keylogger how do they work?
- when u install the program u have a config executable and a server executable, the config lets u configure what the keylogger should log, where it should send it to and what kinda stealth(invisibility to scanners) to use. the server executable you should NOT OPEN! only for test, cause this is the executable that installs the logger on the computer where its run on. so you should send the server executable to the victom.
advantages?
you are able to see about everything a person is doing on his computer, every key, every window thas opened and also screenshots can be send to you. the sending is mostly done by email.
disadvantages?
almost all keyloggers are known at many virusscanner libraries. so theres a big chance the victom will notice you have send him a keylogger cause the scanner will warn the user and delete or quarantine the file. so most people who have a decent virusscanner AND UPDATED wont be vulnerable to keyloggers.
than how would i be able to log if the victom has a virusscanner and updated?
here are many answers to, just be creative. the easiest way would be to disable the virusscanner. u do this by deleting a few important files or just remove the program from startup with a batchfile converted to an exe(if u dont convert it to an exe the user will be able to see the source of the batch file and wont open it). and wait till the user reboots. otherways are changing code, combine multiple loggers or write your own logger.
my advice: dont log anyone. it is illegal and will get u into trouble if u do not know what ur doing.
another thingy: NOBODY IS INVISIBLE ON THE INTERNET. and neither are you!
thats about it
if u wanna try this at home (i dont advice this), u can download lotts of keyloggers by just entering "download keylogger" at google. make sure u register it or patch it otherwise the logger wont be invisble.
Quote:
|
Ok, I dont get how to edit or anything
|
just try and if u fail, try again, if u fail, try again, if u fail again remove the program and go and play conquer or something u do understand.
change subject!
maybe it would be an idea to log the packets of for example: a ginseng box
cause u open it and gain 3 items, maybe the opening packet should be send again.
even small things like this could work.
cause when it does u can go to bigger things like moonboxes aaigt
anyways im gonna test some theories of mine and will post if i get any succes.
gr Scorp