Pages

Tuesday, October 12, 2010

Password hacking

Many a times we want to hack the password of some person 'xyz' and we keep thinking of the ways we can do it. And there may be is a chance that this person uses your laptop / computer at times to check his/ her email/facebook or orkut or any of it. We also want to see the details or the chat history i.e. who did he chat with and what did he chat.

Now how do we do to get these information ? Just go and ask him...

No, he will to tell you all this. Now to know all this secretly and without his/her knowledge we can use certain third party tools named the "KEYLOGGERS" these are the tools which help you can make the logs of the things done on the computer by him or her,the best part of these monitoring tools is that they can be easily be hidden and the user cannot come to know that they are present.And one more thing few of these tools also work on remote systems.

How to look for them :: just go to google and type keyloggers and you find a large range of them. But the few, which are working properly and We personally have worked with are:

1. Ardamax Keylogger: This is a very good and effective tool in the case of key loggers. Easily available on the Internet. This works on remote systems also. But this is a paid version, And we all know how to use torrent .

2. Child safe: This is also equivalent to Ardamax but works only on a personal system. This has a very effective snapshot feature. They are easily available on the Internet.

3. Actual spy: It is just a key logger but very effective and easy to use. This is a freeware available on the Internet.

4.Perfect keylogger: This has an advance feature of taking snapshot at every mouse click. Not a freeware .Available on the Internet.

How to use them ??

step 1: Download any one of them.

step 2: Install it on the system where you want it to log the data from(if remote system attach it to a file and send it to your friend and as soon as he clicks on the file at the background it will get installed) we will make another post about "How to attach a keylogger to a file".

step 3:Look at the instructions and carefully configure the logger as required.

step 4: Be careful because it might log your data also, If installed on your system.

This way you you can log the data ...

0 comments:

Post a Comment