Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Hacking Facebook with a
Keylogger
Hamza Shahid Mirza – Certified Ethical Hacker
Disclaimer
• Please note that this tutorial is for educational purpose only.
Using this technique to attack someone can pu...
What is Keylogging?
Keylogging or keyboard capturing, is the action of recording the
keys struck on a keyboard, typically ...
So let’s get started…
Step 1: Before we start our keylogger, we need to migrate the Meterpreter to the
application or proc...
Let's migrate to that process and capture any keystrokes entered there. Type:
meterpreter > migrate 912
You can see from t...
Step 2: Start the Keylogger
Now that we have migrated the Meterpreter to the Notepad, we can embed the keylogger.
Metasplo...
Step 3: Write a Short Note on the Victim System
Our today’s victim is your girlfriend … (Just in case she’s cheating on yo...
Step 4: Recover the Keystrokes
Now, let's go back to our system with Meterpreter running on Metasploit. We can now
dump al...
You’ve finished this document.
Download and read it offline.
Upcoming SlideShare
Spywares & Keyloggers
Next
Upcoming SlideShare
Spywares & Keyloggers
Next
Download to read offline and view in fullscreen.

Share

Hacking with a keylogger.

Download to read offline

This tutorial shows how to hack using a keylogger. Once you complete the whole process successfully, you can see every letter that's been typed by your victim. And yes, that includes facebook emails and passwords too!

Hacking with a keylogger.

  1. 1. Hacking Facebook with a Keylogger Hamza Shahid Mirza – Certified Ethical Hacker
  2. 2. Disclaimer • Please note that this tutorial is for educational purpose only. Using this technique to attack someone can put you in a serious trouble. • Hacking using this technique requires a little programming knowledge. If you don’t know how to program then see my other tutorial on how to hack using the phishing method. • You need to be using the person’s computer you want to hack.
  3. 3. What is Keylogging? Keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
  4. 4. So let’s get started… Step 1: Before we start our keylogger, we need to migrate the Meterpreter to the application or process we want to log the keystrokes from. Let's check to see what processes are running on the victim system by typing: meterpreter >ps Notice in the screenshot that we have a listing of every process running on the victim system. We can see about 1/3 of the way down the process listing with a Process ID (PID) of 912, the Notepad application is open and running.
  5. 5. Let's migrate to that process and capture any keystrokes entered there. Type: meterpreter > migrate 912 You can see from the screenshot that Meterpreter responds that we have migrated successfully.
  6. 6. Step 2: Start the Keylogger Now that we have migrated the Meterpreter to the Notepad, we can embed the keylogger. Metasploit’s Meterpreter has a built-in software keylogger called keyscan. To start it on the victim system, just type: meterpreter> keyscan_start With this command, Meterpreter will now start logging every keystroke entered into the Notepad application.
  7. 7. Step 3: Write a Short Note on the Victim System Our today’s victim is your girlfriend … (Just in case she’s cheating on you) *wink wink* Let's now move to our victim system and write a short note to make sure it works. As you can see in screenshot above, she has written a short note to bae, asking him to come visit while her boyfriend is gone. All of these keystrokes are being captured by our keylogger providing us with evidence of her cheating heart (or some other organ). P.S. Clear evidence she wants someone else’s D 
  8. 8. Step 4: Recover the Keystrokes Now, let's go back to our system with Meterpreter running on Metasploit. We can now dump all of the keystrokes that were entered on your loving girlfriend's computer. We simply type: meterpreter> keyscan_dump And now, every keystroke has been captured including the tabs and end of line characters. Now you have the evidence on your loyal girlfriend, bro!
  • ShamshadBanu

    Sep. 1, 2019
  • nadiayussof1

    Aug. 24, 2016
  • bluemner

    Mar. 26, 2015

This tutorial shows how to hack using a keylogger. Once you complete the whole process successfully, you can see every letter that's been typed by your victim. And yes, that includes facebook emails and passwords too!

Views

Total views

1,508

On Slideshare

0

From embeds

0

Number of embeds

1

Actions

Downloads

36

Shares

0

Comments

0

Likes

3

×