Skip to main content

How to became a Hacker { Intermediate }.

KEY LOGGING

Key logging is an art of hacking where you have physical access to the computer and its hardware ports for the keyboard. By using undetectable hardware, you can record every key your victim presses on their keyboard, revealing their account passwords so you can hack them.

Stealth is a key trait of any good hacker. The next key trait is vanishing without a trace. Keyloggers are great because you can hack anything with them, install them without being tracked by McAfee Antivirus, and leave with your victim’s passwords without them ever knowing.

COMMON USES FOR KEYLOGGERS

  • Find out if your husband/wife/boyfriend/girlfriend is cheating on you by getting their passwords and hacking their e-mail or dating web site account.
  • Get the password your parents set on the web filter so you can go to any site. You can also do this at school like I did.
  • Record your victim’s internet history and what they type into web sites.
  • Get your teacher’s computer password to change your grades.

HARDWARE PORTS

One of the most technical things about hacking is ports. There are software ports (examples include things like Bluetooth and Telnet) and hardware ports that you plug hardware into (things like FireWire devices and RAM). Keyloggers deal with hardware ports, and luckily keyboards only use two: USB and PS/2.

USB

USB ports are becoming really popular because they’re fast. They’re used not only for keyboards, but also printers, cameras, cell phones, wireless network/Wi-Fi cards, GoPros, and even XBox 360 controllers.
View an image of a USB Port
Warning: The picture above also labels lightning ports. Make sure you don’t confuse your USB ports with lightning, FireWire, or serial port and try to plug the keylogger in. It will not work.

PS/2

PS/2 can be easily identified because they’re always purple, which is nice because you can find them quickly (good hackers are always fast). The only device that uses PS/2 is the keyboard, unlike USB, so you won’t have to worry about hooking the keylogger up to the wrong device. All you’ll need to do is look for the purple port on the back of the computer and install the keylogger.
View an image of a PS/2 Port

TYPES OF KEYLOGGERS

There are three different types of keyloggers. Read below to find out which one will work for the computer you’re trying to hack. I’ve listed the good and bad about each one and included pictures to identify the hardware ports you have.

USB

USB keyloggers are my favorite because they’re less expensive and much faster compared to PS/2 or Wi-Fi. They work on Windows computers, Macintosh computers, Apple computers, and even servers. They typically don’t work on Linux computers because those usually have PS/2 instead.

PS/2

The most insecure port of them all. PS/2 is widely used by by Linux servers. You probably won’t ever need this type because PS/2 or Linux hasn’t been used a lot since the late 1990’s.

WIRELESS WI-FI

Wireless keyloggers work like USB keyloggers (they use USB ports), except that they’re wireless, which means you don’t have to worry about uninstalling it to get the passwords. The bad thing about them is that they’re more expensive and not as fast as USB.

USING KEYLOGGERS

Keylogging can be tricky if you don’t know which port to look out for. If you read the instructions above, you should be prepared. To install a keylogger, just follow the steps below. I’m using USB in the pictures, but the same instructions apply to a PS/2 keyboard logger.
  1. Identify the target computer
  2. Trace the cord from the keyboard to the back of the computer.
  3. Unplug the keyboard to identify the port.
  4. Plug the keylogger into the hardware port, and then plug the keyboard into the keylogger.
  5. Wait as your victim unknowlingly stores all of his passwords, emails, web site history, and AIM instant messenger chats into the keylogger. Keyloggers can hold megabytes of information, which is a lot. This means you can wait days or even weeks if you want.
  6. When the coast is clear, unplug the keylogger and take it back to your computer.
  7. Hack them.

GET YOUR KEYLOGGER

The cheapest place to find Keyllama USB keyloggers (they are the best) is on Amazon. The Keyllama stores 4 MegaBytes of keystrokes, which is 2000 pages of data.
Get your keylogger 


Posted by Nagesh ;)

Comments

Popular posts from this blog

How to remove the WannaCry & Wana Decryptor Ransomware.

How to remove the WannaCry & Wana Decryptor Ransomware Table of Contents 1 Who is this guide for? 2 What is WannaCry, WannaCryptor, WNCRY, or Wana Decryptor? 3 How to remove the WannaCry and Wana Decryptor Ransomware 4 Is it possible to recover WNCRY files that have been encrypted by WannaCry for Free? 5 How to Protect yourself from the WannaCry or Wana Decryptor Ransomware. Who is this guide for? If a user is infected with the WanaCrypt0r/Wana Decryptor Ransomware then it is important that they remove it immediately. This is because even if you are not going to pay the ransom, while the ransomware is running it will continue to encrypt new files as they are created. This guide will guide victims on how they can remove the WannaCry and Wana Decryptor 2.0 infection from their computer. This guide, though, will not allow you to decrypt your files for free. This is currently impossible. I will provide steps that you can use to possibly recover files (slim chanc

Top 10 Secret Tricks in Google.

In This Cool Video i will be Telling you Google Most secret Tricks in Top 10.. Telugu Click this Link if the video is not Working. https://youtu.be/tX7X-OsP6Hs Posted by Nagesh ;)

Top 10 Free Instagram Hacker App For iPhone and Android.

Top 10 Free Instagram Hacker App For iPhone and Android Posted by Nagesh ;) Instagram is no doubt one of the most used apps when it comes to uploading and sharing pictures with your friends and families. However, as much as you may like to use Instagram, the fact remains that anyone can access your account with or without your consent. How is this possible you may ask? The answer lies in the Instagram hacker app. Yes!! You heard right. An Instagram hacker app is a type of an app that works by retrieving passwords and other login details from a target account. As it stands, since Instagram is available on both the Android and iOS platforms, these apps can be found on this platforms as well. These Instagram hack apps are efficient when it comes to hacking passwords, so it's best to be guaranteed that they will hack your IG account in a matter of minutes. Part 1: 5 Free Instagram Hacker App For iPhone Part 2: 5 Free Instagram Hacker App For Android Part 3: Using