Jump to content

Recommended Posts

Posted

psaxnw kairo se diafora sites kai den exo vrei pouthena mia olokliromeni apadisei gia ta keyloggers...borei kapios an exei ton xrono na valei ena guide..estw kati pou na eksigei....peste oti exo ena keylogger..pos to metatrepw se alli morfi...kai to stelno apo msn oste o allos na valei to account ekei...plz opios borei as voithisei...

 

P.S eixe arxisei ena katapliktiko guide o lostos alla edo kai 2 mines den exei emfanistei...

Posted

Article about keyloggers (key loggers):

 

Keylogger is a software program or hardware device that is used to monitor and log each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because these programs and hardware devices monitor the keys typed in a user can easily find user passwords and other information a user may not wish others to know about.

Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

 

About keyloggers

 

A keylogger is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a keylogger will reveal the contents of all e-mail composed by the user. Keylogger is commonly included in rootkits.

 

A keylogger normally consists of two files: a DLL which does all the work and an EXE which loads the DLL and sets the hook. Therefore when you deploy the hooker on a system, two such files must be present in the same directory.

 

There are other approaches to capturing info about what you are doing.

 

    * Some keyloggers capture screens, rather than keystrokes.

    * Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

 

A keyloggers might be as simple as an exe and a dll that are placed on a machine and invoked at boot via an entry in the registry. Or a keyloggers could be which boasts these features:

 

    * Stealth: invisible in process list

    * Includes kernel keylogger driver that captures keystrokes even when user is logged off (Windows 2000 / XP)

    * ProBot program files and registry entries are hidden (Windows 2000 / XP)

    * Includes Remote Deployment wizard

    * Active window titles and process names logging

    * Keystroke / password logging

    * Regional keyboard support

    * Keylogging in NT console windows

    * Launched applications list

    * Text snapshots of active applications.

    * Visited Internet URL logger

    * Capture HTTP POST data (including logins/passwords)

    * File and Folder creation/removal logging

    * Mouse activities

    * Workstation user and timestamp recording

    * Log file archiving, separate log files for each user

    * Log file secure encryption

    * Password authentication

    * Invisible operation

    * Native GUI session log presentation

    * Easy log file reports with Instant Viewer 2 Web interface

    * HTML and Text log file export

    * Automatic E-mail log file delivery

    * Easy setup & uninstall wizards

    * Support for Windows ® 95/98/ME and Windows ® NT/2000/XP

 

Because a keylogger can involve dozens of files, and has as a primary goal complete stealth from the user, removing one manually can be a terrifying challenge to any computer user. Incorrect removal efforts can result in damage to the operating system, instability, inability to use the mouse or keyboard, or worse. Further, some key loggers will survive manual efforts to remove them, re-installing themselves before the user even reboots.

 

 

 

An den se kalipsa psile dn kserw ti allo na vrw... afto to vrika apo ton filo mou ton googli se 2 min

 

 

EDIT ::::::

 

Pare kai allo ena pou vrika molis tora...

 

 

 

_________

 

WAYS OF INFECTION

Keyloggers differ from regular computer viruses. They do not spread by themselves and usually must be installed as any other software with or without user content. There are two major ways unsolicited keystroke logging program can get into the system.

 

1. A legitimate keylogger can be manually installed by system administrator or any other user who has sufficient privileges for the software installation. A hacker can break into the system and setup own keylogger. In both cases a privacy threat gets installed without the monitored user’s knowledge and consent.

2. Malicious keyloggers often are installed by other parasites like viruses, trojans, backdoors or even spyware. They get into the system without user knowledge and affect everybody who uses a compromised computer. Such keyloggers do not have any uninstall functions and can be controlled only by their authors or attackers.

 

Keyloggers affect mostly computers running Microsoft Windows operating system. However, some less prevalent parasites can be also found on other popular platforms.

 

WHAT A KEYLOGGER DOES?

- Logs each keystroke a user types on a computer’s keyboard.

- Takes screenshots of user activity at predetermined time intervals or when a user types a character or clicks a mouse button.

- Tracks user activity by logging window titles, names of launched applications, exact time of certain event occurrence and other specific information.

- Monitors online activity by recording addresses of visited web sites, taken actions, entered keywords and other similar data.

- Records login names, details of various accounts, credit card numbers and passwords including those hidden by asterisks or blank space.

- Captures online chat conversations made in popular chat programs or instant messengers.

- Makes unauthorized copies of outgoing and incoming e-mail messages.

- Saves all collected information into a file on a hard disk, then silently sends this file to a configurable e-mail address, uploads it to a predefined FTP server or transfers it through a background Internet connection to a remote host. Gathered data can be encrypted.

- Complicates its detection and removal by hiding active processes and concealing installed files. The uninstaller, if it exists, usually refuses to work if a user cannot specify a password.

 

EXAMPLES OF KEYLOGGERS

There are lots of different keystroke logging applications, both commercial and parasitical. The following examples illustrate typical keylogger behavior.

 

Family Key Logger is a relatively simple commercial keylogger targeted to parents who need to know what kids are doing online while they are not at home and to users who want to spy on their spouses. Family Key Logger is designed to record all user keystrokes. It doesn’t have additional functionality and must be manually installed. Most legitimate keyloggers are quite similar to Family Key Logger and therefore are not extremely dangerous.

 

Delf is the entire family of harmful trojans with keystroke logging functions. These parasites not only record every user keystroke, but also give the remote attacker full unauthorized access to a compromised computer, download and execute arbitrary code, steal user’s vital information such as passwords, e-mail messages or bank account details. Delf threats send all gathered data to the attacker through a background Internet connection. Moreover, they can cause general system instability and even corrupt files or installed applications.

 

Perfect Keylogger is a complex computer surveillance tool with rich functionality. It records all user keystrokes and passwords, takes screenshots, tracks user activity in the Internet, captures chat conversations and e-mail messages. Perfect Keylogger can be remotely controlled. It can send gathered data to a configurable e-mail address or upload it on a predefined FTP server. Although it is a commercial product, it’s even more dangerous than most parasitical keyloggers.

 

CONSEQUENCES OF A KEYLOGGER INFECTION

Practically all keyloggers are very difficult to detect. They can violate user privacy for months and even years until the user will notice them. During all this time a regular keylogger is able to find out everything about the user. Someone who controls a keylogger gets priceless information including the monitored user’s passwords, login names, credit card numbers, exact bank account details, contacts, interests, web browsing habits and much more. All this information can be used to steal victim's valuable personal documents, money, use his name, address and other identity data for criminal offences.

 

HOW TO REMOVE A KEYLOGGER?

Most keyloggers work in the same manner as the computer viruses and therefore can be found and removed with the help of effective antivirus products like Symantec Norton AntiVirus, Kaspersky Anti-Virus, McAfee VirusScan, eTrust EZ Antivirus, Panda Titanium Antivirus, AVG Anti-Virus. Some advanced spyware removers, which are able to scan the system in a similar way antivirus software does and have extensive parasite signature databases can also detect and remove keyloggers and related components. Powerful anti-spyware solutions such as Microsoft AntiSpyware Beta, Spyware Doctor, Ad-Aware SE, SpyHunter, eTrust PestPatrol or Spybot - Search & Destroy are well-known for perfect keylogger detection and removal capabilities.

 

In some cases even an antivirus or spyware remover can fail to get rid of a particular keylogger. That is why there are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices.

 

Not all keyloggers (even if they track your personal information) are illegitimate and needed to remove immediately.

 

 

 

Posted

btw o lostos dn nomizw na xe kanei guide...

 

Edwse kapoia home keyloggers, gia na elenxeis ta pedia sou, tous allous xrhstes ki etc

 

PS Eleos re black, apadisH einai oxi apadisei :D

Posted

karm4 ty pou asxolithikes me to prob mou...alla thelo na mou pei kapios pou na to exei xrisimopoiisei....kserw ti einai keylogger aplos ithela apo kapion pou na to exei xrisimopioisei na mou pei ti kanei....

 

P.S lol N.A.B..lathos mou :P

Posted

kapios me mia pio logiki apadisei??

 

Ti allo 8es na ma8eis ??

Den se kalipsa ??

 

Sta parapano keimena anaferetai.....

 

*Ti kanoun ta keylogger

*Pos ta xrisimopoieis...

*Pos na sviseis ena keylogger...

*Pos mporei kapoios na sou steilei ena...

 

8es kai alla na ma8eis  ??? :P

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • I created a system of FAKES to improve my GeoEngine, but I'm having problems with blocks. I've tried everything to fix it, but a block going from the inside out bugs the player's movement and freezes them. However, the reverse doesn't cause this bug. If I'm outside and click inside, the path is traced normally, but if it's reversed, it bugs at the fence. I've created several debugs and read all kinds of GeoEngine versions, but I haven't had any success. Can someone give me some insight into graphical data?   When fakes spawn, they are given possible routes, but they don't follow them. If there's a target, instead of following the correctly drawn path, it simply uses a straight line.  
    • The legendary L2Elixir you remember from 2008 is officially back — remastered, refreshed, and reborn! Our x3 Interlude server launched on 28 November, and the community is growing every single day.   🔥 Fresh start 🔥 Active players joining daily 🔥 Long-term project — Licensed for over 5 years from PlayINERA. 🔥 True 2008 nostalgia with modern stability & polish   If you were part of the original Elixir family, this is your chance to relive the magic. If you’re new — welcome to a classic Lineage II experience built with passion, not profit.   Join the battles. Join the nostalgia. Join L2Elixir Reborn. Website: https://l2elixir.org/ Discord: https://discord.gg/5ydPHvhbxs
    • still available?  java version? client  salvation?  accept smarguart¡?
    • 🎉 L2NeverPain StuckSub - GRAND OPENING 12 December 2025🎉 After beta, testing, mistakes, laughs and a lot of PvP, the moment has finally come. L2NeverPain StuckSub is officially opening its gates on 12 December 2025.   ⚔️What to expect: ✦Main Class +2 Stuck Sub system ✦Balanced PvP & custom party farm areas ✦Custom events, bosses and strong rewards ✦Competitive clan scene with castle rewards   📌Until the opening: ✦Create your clans and register them in the Clan-Register channel ✦Invite your friends / old parties / CPs ✦Stay tuned for more information (rates, events, siege times, etc.)   Get your setups ready, prepare your macros and your Discord/voice. On 12 December 2025 20:00 GMT+2, we write the first chapter of NeverPain together. 🔥 https://l2neverpain.com/ https://discord.gg/kNP3UXgkmN
  • Topics

×
×
  • Create New...

AdBlock Extension Detected!

Our website is made possible by displaying online advertisements to our members.

Please disable AdBlock browser extension first, to be able to use our community.

I've Disabled AdBlock