Keylogger's and RAT's nowadays are everybody's problem across the internet. Hackers use keyloggers to hack the email passwords
of the victim which they receive in the form of emails or text files on
their respective FTP servers. They spread their keyloggers with the
help of cracks, keygen's or patches of popular software's or simply
through hack tools. So friends, today i will teach you how to reverse engineer the keylogger or RAT to hack the hackers FTP server or email password.
Most of hackers thinks that they are too smart, so what they do bind their keylogger
or Rat servers with popular programs and when user open that their
system got infected and hence what ever they type is get recorded and
sent to hacker.
Now all keyloggers sent data to hacker in regular intervals (usually every 5 to 10 minutes) by using below to ways:
1.
Using the Emails : where hacker configures his email ID and password
while creating the server. Keylogger records the key strokes in a temp
file and sends it to the hacker in form of emails. But this has a limit
as most free email servers like Gmail or Yahoo or Hotmail has limit of
500 composed and received mails. So most hackers use the second method.
2.
FTP server : While creating the keylogger server, hacker configure
their FTP server, where they receive the logs of key strokes in the form
of text file( usally labeled on the basis of current system time
stamp). Hackers keylogger server uploads the files to FTP server after
every few minutes interval.
So
friends, here the actual trick or loophole in above technique lies. If
we monitor the everything coming in and going out of our Ethernet card
or Wireless then we can detect that what is going out of our system. Its
nothing but just monitoring your your system's traffic, where its going
and from where its coming. You can use any of the tool that monitor the
packet flow of your Ethernet or wireless card.
ok...ok.. let me tell you my favorite tool for doing the same. I love Wireshark because its simply superb.
Wireshark is a very famous network scanning
hack tool which is used by hackers or network forensic experts to
monitor the packet flow of their network cards like Ethernet or WLAN. It
records the each and every packet coming and going out of your system's
Network card. Now you all must be thinking wth is this Packet. Packet
is nothing but just a bunch of bits(data in form of 0 & 1) usually
32bit or 64bit. In network terminology, data is termed as packet which
can be either TCP or UDP( both contains the header n other stuff
accordingly).
So friends, whenever you feel anything suspicious
in your system like your system is compromised or you are infected from
a keylogger or RAT or simply you want to test a hack tool and you are
not aware that hack tool is safe to use or not. Just follow the below
procedure to reverse engineer these noob hacking tools.
Note:
Every keylogger or RAT sends the logs to hacker's FTP server or email
account after few minutes interval( when you are connected to internet)
but some novice keyloggers even tries to send data while you are offline
and hence the data sending keep on failing. In some situations it
displays warning message and in some situations you PC gets hanged or
SVHOST service CPU usage increases. But nothing matters whether it sends
logs online or offline, the only thing matter is time period, after
what interval it sends data.
Steps to Hack or reverse engineer the Hacker's Keylogger server password:
1. First of all download and install the wireshark. You can easily get this using by Googling it.
Note: While Wireshark is getting installed, ensure that it installs the Winpcap with it other it won't work properly.
2.
Now go to the Capture button in the top menu of the Wireshark as shown
below and select the interface( means your network card which can be
Ethernet or WLAN).
{for newbies : In wireshark, click on capture}
3.
Now it will start capturing the packets through that Network card. What
you have to do is just keep capturing the records for atleast 20 - 30
minutes for getting the best results. After 20- 30 minutes, again go to
capture and stop capturing the packets.
4.
Now you need to filter your results, for this Go to the filter box and
type FTP and SMTP one by one. Note: if you get records for FTP then
hacker has used FTP server and if you didn't got FTP that means hacker
has used SMTP, so give SMTP in Filter box.
5.
As you scroll down you will find the “FTP username” and “Password” for
victims ftp account in case FTP server is used. And if hacker has used
SMTP then you will find "email address" and its "password" that hacker
has used to create keylogger.
6. That's all my friends. Isn't that too easy.
2 comments:
Very nice. Thnks buddy
My pleasure
Post a Comment