Lect20 Keylogger
Lect20 Keylogger
Key Logger
silent, does not show up in the start-menu, windows startup, program files,
add/remove programs or the task manager.
2
KEY LOGGER
TYPES OF KEY LOGGER
4
KeyLoggers
1 Spyrix Free Keylogger
2 KidInspector. ...
6 KidLogger. ...
9 Ardamax Keylogger
5
Key_Logger 3.9 (install) Task
• Install Local Key logger
•
http://www.iwantsoft.com/
6
Iwantsoft Keylogger
• Iwantsoft keylogger
7
Iwantsoft Keylogger
• Keylogger Settings
8
Iwantsoft Keylogger
• Screenshots
• Webcam, microphone
• Are available in paid version
9
Iwantsoft Keylogger
• Can perform analysis
• What all activities have been performed
10
Iwantsoft Keylogger
• Can perform analysis
• Logs after 10 mins
11
Key strokes recorded
• Key strokes recorded
12
Report Viewer
• Search in Report
13
Hack a Remote Computer Using Ardamax Keylogger?
14
Ardamax Keylogger-Task
• https://www.ardamax.com/keylogger
• Username: ardamax
• Password: ardamax
• After install you can delete but it is working (can check in task manager or triangle
yellow icon on taskbar)
• Open and view logs
• It works on everything notepad, start, online accounts etc
• Hidden mode: attacker can hide also (right click)- ctrl + H
• Invisibility option: from task manager. It auto starts
15
Requirements
16
Ardamax Installation
Installation and Registration
• At first run setup of Ardamax keylogger tool in our computer with a valid registration
key.
17
Ardamax Registration
Step 4
• After installing Ardamax keylogger, select and right click Ardamax keylogger icon
from your tasks bar.
• Now select enter registration key,
• then put in the name and the serial number
which you will get from the downloaded software
folder
18
Registration Process
• Enter Information
19
Configuration process
Step 5
• Hit right-click on tool icon and choose this option from drop down – remote
installation
20
Ardamax Steps
Step 5 continued
• Now we have to check all options in both appearing tabs and click Next button.
21
Ardamax Steps
Step 6
• In the security tab, insert password and choose the enable option. After do it
hit Next button.
22
Ardamax Steps
Step 7
• Now click enable and enter a password so that no one can open the keylogger
then click next three times,
• check "send logs every " and set your time say 5 min,
• Then select delivery method as Ftp, finally click next
23
Ardamax Steps
24
Ardamax Steps
Step 8
• Now enter your ftp account details which you created earlier.
• In this case enter Ftp host -ftp.drivehq.com,
• remote folder -/logs,
• user - test,
• Finally click next
25
Ardamax Steps
Step 9
• Now check all the boxes and click next,
• set your time for capturing the screen shots,
• then click next,
• If you want change the icon by selecting change icon
• Finally select next and click finish
26
Ardamax Steps
Step 10
• If you've done all the steps correctly, you should get a server file (keylogger file),
• But this server file can be easily detected by anti –viruses.
28
Ardamax Steps
Note:- After crypting if this Keylogger is still detected by your anti-viruses,
Then please use Rinlogger (Free Keylogger ) which is 100% FUD from Here
This is a simple but a very effective method of hacking a remote computer.
29
Ardamax Steps
Step 11
• Now send the fully undetectable Server file(keylogger file) to your victim via email
or can upload it to any site and ask the victim to download the file.
• You can also give the keylogger file to the victim in pendrive (changing name of the
file)
• Once the victim clicks the application, Ardamax keylogger will automatically install
and
• will send logs(containing Facebook password email passwords ,chat logs ..etc) to
your ftp account.
• You can view your victims logs by going to your ftp account
30
Ardamax Icon on screen
• Right after you install and run Ardamax Keylogger,
• It starts monitoring your computer. It adds an icon to the System Tray.
31
Menu
• Right-click the icon to access the options. You will see the menu.
32
Hidden Mode (Imp)
• Ardamax Keylogger can run in the hidden mode so that it is impossible to detect it.
• If you enable this mode, the program can become invisible in the Start Menu, in the
installed software list and in the list of running processes.
• Switch to the Invisibility Page to configure this mode.
33
Remote Installation
• Remote Installation Wizard is used to create the installation package that will install
the keylogger on the target computer once it is launched.
• Note: this feature is available for registered user only.
• Please register your Ardamax Keylogger copy.
• To create such a package, right-click the tray icon.
34
Log Page
• You can use this page to manage log files and enable/disable monitoring the
computer.
• Here you can also see information about the sizes of saved logs of each type.
35
Email Page
• Use this page to specify the email settings that will be used to send logs.
36
Keystroke Log/ Web Logs/chat Logs
Select View – Keystroke Log on the menu to view the keyboard log. A keyboard log
consists of the list of entries with the following fields:
• Date – entry date.
• Time – entry time.
• User - Windows username.
• Application name – active process name.
• Window Title - active window title.
37
Student jailed for using keylogger to up his exam marks
38
Practical
• Make your own Keylogger
39