0% found this document useful (0 votes)
52 views39 pages

Lect20 Keylogger

Uploaded by

Mousa Akl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views39 pages

Lect20 Keylogger

Uploaded by

Mousa Akl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 39

KeyLogger

Key Logger

Installed on a Victims computer.

records these keystrokes and stores them in the logs.

Starts operating in the background (stealth mode) and captures every


keystroke of the target computer.

silent, does not show up in the start-menu, windows startup, program files,
add/remove programs or the task manager.

2
KEY LOGGER
TYPES OF KEY LOGGER

4
KeyLoggers
1 Spyrix Free Keylogger

2 KidInspector. ...

3 Actual Keylogger. ...

Tools 4 REFOG Free Keyloger. ...

5 Iwantsoft Free Keylogger. ...

6 KidLogger. ...

7 Best Free Keylogger. ...

8 Revealer Keylogger Free. ...

9 Ardamax Keylogger
5
Key_Logger 3.9 (install) Task
• Install Local Key logger

http://www.iwantsoft.com/

6
Iwantsoft Keylogger
• Iwantsoft keylogger

7
Iwantsoft Keylogger
• Keylogger Settings

8
Iwantsoft Keylogger
• Screenshots
• Webcam, microphone
• Are available in paid version

9
Iwantsoft Keylogger
• Can perform analysis
• What all activities have been performed

10
Iwantsoft Keylogger
• Can perform analysis
• Logs after 10 mins

11
Key strokes recorded
• Key strokes recorded

12
Report Viewer
• Search in Report

13
Hack a Remote Computer Using Ardamax Keylogger?

14
Ardamax Keylogger-Task
• https://www.ardamax.com/keylogger
• Username: ardamax
• Password: ardamax
• After install you can delete but it is working (can check in task manager or triangle
yellow icon on taskbar)
• Open and view logs
• It works on everything notepad, start, online accounts etc
• Hidden mode: attacker can hide also (right click)- ctrl + H
• Invisibility option: from task manager. It auto starts

15
Requirements

1. Ardamax 2. Ftp account 3. Crypter Software


• keylogger • You can create a • To disable antivirus
Download free ftp account detection
• from Here which from • You can
is FUD (Fully www.drivehq.com Downland Crypter
UnDetectable by Software from Here
anti-viruses ) Download HERE. pa
ssword is @hackah
olic
• How to Bypass Anti-Virus
through FUD Crypter

16
Ardamax Installation
Installation and Registration
• At first run setup of Ardamax keylogger tool in our computer with a valid registration
key.

17
Ardamax Registration
Step 4
• After installing Ardamax keylogger, select and right click Ardamax keylogger icon
from your tasks bar.
• Now select enter registration key,
• then put in the name and the serial number
which you will get from the downloaded software
folder

18
Registration Process
• Enter Information

19
Configuration process
Step 5
• Hit right-click on tool icon and choose this option from drop down – remote
installation

20
Ardamax Steps
Step 5 continued
• Now we have to check all options in both appearing tabs and click Next button.

21
Ardamax Steps
Step 6
• In the security tab, insert password and choose the enable option. After do it
hit Next button.

22
Ardamax Steps
Step 7
• Now click enable and enter a password so that no one can open the keylogger
then click next three times,
• check "send logs every " and set your time say 5 min,
• Then select delivery method as Ftp, finally click next

23
Ardamax Steps

24
Ardamax Steps
Step 8
• Now enter your ftp account details which you created earlier.
• In this case enter Ftp host -ftp.drivehq.com,
• remote folder -/logs,
• user - test,
• Finally click next

25
Ardamax Steps
Step 9
• Now check all the boxes and click next,
• set your time for capturing the screen shots,
• then click next,
• If you want change the icon by selecting change icon
• Finally select next and click finish

26
Ardamax Steps
Step 10
• If you've done all the steps correctly, you should get a server file (keylogger file),
• But this server file can be easily detected by anti –viruses.

So to bypass anti viruses we need to bind and crypt the file


• To do this, open your crypter software (which you downloaded earlier)
• Now select file 1 as the server file (key logger file which you created) and
• then select file 2 as any application,
• select a good application(select a PDF file for best performance)
• finally click Crypt file,
• Now you will get a crypted server file ( key logger file ) which is FUD
27
Ardamax Steps
We will receive keylogger file shortly that is fully undetectable by antivirus. It is
installed in Stealth mode

28
Ardamax Steps
Note:- After crypting if this Keylogger is still detected by your anti-viruses,
Then please use Rinlogger (Free Keylogger ) which is 100% FUD from Here
This is a simple but a very effective method of hacking a remote computer.

29
Ardamax Steps
Step 11
• Now send the fully undetectable Server file(keylogger file) to your victim via email
or can upload it to any site and ask the victim to download the file.
• You can also give the keylogger file to the victim in pendrive (changing name of the
file)
• Once the victim clicks the application, Ardamax keylogger will automatically install
and
• will send logs(containing Facebook password email passwords ,chat logs ..etc) to
your ftp account.
• You can view your victims logs by going to your ftp account

30
Ardamax Icon on screen
• Right after you install and run Ardamax Keylogger,
• It starts monitoring your computer. It adds an icon to the System Tray.

31
Menu
• Right-click the icon to access the options. You will see the menu.

32
Hidden Mode (Imp)
• Ardamax Keylogger can run in the hidden mode so that it is impossible to detect it.
• If you enable this mode, the program can become invisible in the Start Menu, in the
installed software list and in the list of running processes.
• Switch to the Invisibility Page to configure this mode.

33
Remote Installation
• Remote Installation Wizard is used to create the installation package that will install
the keylogger on the target computer once it is launched.
• Note: this feature is available for registered user only.
• Please register your Ardamax Keylogger copy.
• To create such a package, right-click the tray icon.

34
Log Page
• You can use this page to manage log files and enable/disable monitoring the
computer.
• Here you can also see information about the sizes of saved logs of each type.

35
Email Page
• Use this page to specify the email settings that will be used to send logs.

36
Keystroke Log/ Web Logs/chat Logs
Select View – Keystroke Log on the menu to view the keyboard log. A keyboard log
consists of the list of entries with the following fields:
• Date – entry date.
• Time – entry time.
• User - Windows username.
• Application name – active process name.
• Window Title - active window title.

37
Student jailed for using keylogger to up his exam marks

38
Practical
• Make your own Keylogger

39

You might also like