HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER STEP 1: Create Server for Hacking Passwords First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists
of several steps: First of all download the Keylogger and a good binder. Binders are easily available via a Google search. Extract the RAR file. Now you will get one folder and three files. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account. Click on server settings as shown. Here, enter the time at which you want to
receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional. Click on Log and Result Setting. In Log Email Title enter the subject of email like “my keylogger report” or anything else that you you
like. Click the last two options that add computer name and add the victim’s name. Now click on “Other Options.” In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message – so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable. Finally click on Build Keylogger. You will see
your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step. Now your keylogger server is ready for you to hack Facebook accounts. Step 2: Extracting the icon file from any installer (resource hacker) Open the resource hacker folder and select the reshacker file. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker. In the menu, there is one action button. Click on it and then click save all resource. Save all the resources to the desktop or any other location of your choice. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one. That leaves us with the icon of installer file (Ccleaner setup icon). Step 3: Bind the Keylogger server with any software
Step 4: How to spread the keylogger
Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route. Hacking someone’s Facebook account takes more than a few minutes. Welcome back, my greenhorn hackers! Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim's computer using Metasploit. The answer is a resounding "YES"! So, by popular request, in this guide I'll show you how to install a keylogger on your girlfriend's, boyfriend's, wife's, or husband's computer. For those of you wondering what a keylogger is, the simple answer is that it's a
piece of software or hardware that captures every keystroke and saves them for retrieval by you, the attacker. These types of devices have long been used by hackers to capture logins, passwords, social security numbers, etc. Here we will use it to capture the keystrokes of a cheating girlfriend. Fire up Metasploit and let's get started. Like in my last article on disabling antivirus software, I'm assuming that you've successfully installed Metasploit's powerful listener/rootkit on the target system. You can also check my earlier Hack Like a Pro articles for a variety of ways to get it installed. Step 1: Migrate the MeterpreterBefore we start our keylogger, we need to migrate the Meterpreter to the application or process we want to log the keystrokes from. Let's check to see what processes are running on the victim system by typing: meterpreter >ps Notice in the screenshot above that we have a listing of every process running on the victim system. We can see about 1/3 of the way down the process listing with a Process ID (PID) of 912, the Notepad application is open and running. Let's migrate to that process and capture any keystrokes entered there. Type: meterpreter > migrate 912 You can see from the screenshot that Meterpreter responds that we have migrated successfully, Step 2: Start the KeyloggerNow that we have migrated the Meterpreter to the Notepad, we can embed the keylogger. Metasploit's Meterpreter has a built-in software keylogger called keyscan. To start it on the victim system, just type: meterpreter> keyscan_start With this command, Meterpreter will now start logging every keystroke entered into the Notepad application. Step 3: Write a Short Note on the Victim SystemLet's now move to our victim system and write a short note to make sure it works. As you can see in screenshot above, Cheatah has written a short note to Stud, asking him to come visit while her boyfriend is gone. All of these keystrokes are being captured by our keylogger providing us with evidence of her cheating heart (or some other organ). Step 4: Recover the KeystrokesNow, let's go back to our system with Meterpreter running on Metasploit. We can now dump all of the keystrokes that were entered on Cheatah's computer. We simply type: meterpreter> keyscan_dump As you can see, every keystroke has been captured including the tabs and end of line characters. Now you have the evidence on Cheatah! In my next articles, we'll continue to look at other powerful features of Metasploit's Meterpreter. Want to start making money as a white hat hacker? Jump-start your hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from cybersecurity professionals. Buy Now (90% off) > Other worthwhile deals to check out:
|