• Latest Adavnced Remote Keylogger - Project Neptune

    Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. Spyware or keylogger is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. Read more about Spywares.We have seen some methods to protect ourself from keyloggers. We have also discussed some methods for creating our own keyloggers with Ardamax and keyloggers with Apolyse.

    But here we are using a keylogger from Project Neptune, Which has the properties like Email or Ftp log delivery, Self destruction and so on....


    HOW TO SET UP A KEYLOGGER

    1 .Extract all the files from the downloaded archive and open Project Neptune you will see a window as shown below.(click on image to enlarge and do as per screenshots recommended)



    2. Now can either use Email delivery or Ftp delivery of your logs.I am here using a Email delivery for explanation.Its better use a fake account as Email account.But make sure that username and password are correct.and give the id to where you want to get your logs.

    3. Once you entered all the account informations you can click on Test Email Account Information to test the mail.You will get a test mail to address to which you provided.If successfull proced to next step.

    4. In next tab select as per seen below in screenshot,You can give your own settings if you want.Its all depend on you .


    5. In next tab as shown below, Select the installation and working directory for your keylogger



    6. In extra options tab you can also set a self destruction date so that this virus will removed itself in that given date.


    7. In the Server Creation tab You can give the name and description for your virus and finally click on Generate New Server Button as shown below to create keylogger



    Thats it you have successfully created a keylogger.

    You can also read Some crypting and binding techniques to make a virus file FUD.





    NOTE : This detailed description of keylogger is given only for creating awareness and please don't use it for any harmful purposes.We believe that You can be secure only if you know What is Hacking. Know Hacking But No Hacking Thats the aim of Amazing Hackings.

    Follow me on Facebook

    Thanks to Google

    Powered by Blogger.