Sunday, February 27, 2011

Hack Facebook password is using Keyloggers.

Today i will explain you how to hack Facebook password using keylogger.

how to create your Facebook hacker keylogger, its a 100% Fully undetectable keylogger you can check this file using Virus total. Its a 100% FUD remote keylogger with several advanced features.
its so easy that anyone can do it. On my website you will never get any infected tool. If you have any doubt or feel something suspicious always test the link or file with virus total website before downloading. Never believe any website including mine also, always scan download links with virus total website or any such website before downloading it. Download it only when it does not have any virus.


Hack Facebook password using Keylogger Involves following steps:
1. Create your Server that will hack passwords.
2. Extract the Icons from any software
3. Bind the Keylogger to make it Hidden
4. Spread your keylogger to victims

Note: This tutorial is for Educational Purposes only. I and Isoftdl is not responsible for any misuse of knowledge.

Let's start Facebook hacking tutorial in detail :


STEP1 : Create Server for Hacking Passwords
First of all for hacking any facebook account password, we have to create our keylogger server that will run on victims machine or PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keylogger server building process consists of several steps.
The steps involved are mentioned below in detail:
1. First of all download the Keylogger.
http://www.mediafire.com/?t5z9wneqs426q9d

DOWNLOAD BINDER HERE: http://www.mediafire.com/?1udgufwivk0vdmg

2. Extract the RAR file. Now you will get one Folder and three files

3. Now open the Keylogger file. Here you will need gmail ID and password. For safer use create a fake Gmail account

Facebook Hacker Initial Step

4. Now Click on server settings as shown. Here enter the time after which you want to receive reports, its always preferable to use 20 min timer for receiving files. And Click on Output box to choose location of file and give it any name. Its always recommended to use system process name to make it undetectable like svchost or check any process name from your task manager and name it. Other fields are optional. The complete snapshot is shown below:

Second step to choose time interval and name of output file
5. Now Click on Log and Result Setting. In Log EMail Title enter the subject of email like My keylogger report or simply my report or something else that you like. Also Click the last two options that i.e add Computer name and add victim name.

6. Now Click on Other Options. In this section you just have to do one thing. Most hackers prefer warning message POP up but I love keylogger using any message. So unclick message button. Because when you bind it with any other software then it should not any warning messages otherwise it will be detectable.

7. Now at last click on Build Keylogger. Now after you click on it you will see your keylogger file at location that you have chosen in 4th step. Now this keylogger server file will be used to bind with any other software in Binding Step.

8. Now you keylogger server is ready that you will use to hack Facebook accounts. That's all for the server creation step now move to second main step.



Step 2.: Extracting the Icon file from any installer(resource hacker)
1. Open the Resource hacker folder and open the reshacker file.
2. Now go to its menu and open any setup file. Suppose we want to attach our keylogger to Ccleaner setup file. So open the Ccleaner setup with resource hacker.
3. Now in menu there is one action button click on it and then click save all resources.
4. Now save all the resources to desktop or any other location of your choice.
5. It consists of two files one is icon file and other is res file . We only need icon file, so you can delete the other file i.e res file.
6. Now we have Icon of installer file(as discussed above Ccleaner setup Icon).

<span>Step 3: Bind the Keylogger server with any software</span>
1. Now Go to keylogger folder and open the Binder.
2. Now Click on + button given below to add files.
3. Now add the keylogger server and the set up of software (i.e. in our case it's Ccleaner setup).
4. Now in menu of Binder, Go to Settings. There select the icon that we have generated in the previous step and set the location of output file as shown in figure.
5. Now again go to File's menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. Now you have to spread it or send it to the victim that is your friend.

<span>Step4 : How to Spread Keylogger or send it to victim or friend</span>
1. Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it.
2. Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it.
Note: you can also attach keylogger with images also. But that can be detectable by antivirus. So avoid such type of hacking.
So isn't that so easy to hack anyone's Facebook account in just few minutes.

How to protect yourself from these hacks?
Prevention is always better than cure so always follow these steps:
1. Don't use cracked softwares and don't download them from unauthorized websites.
2. Always keep your antivirus and anti-spyware up to date.
3. Always scan the files before transferring them to your USB.
4. Do not allow other users to use your PC i.e password protect it.

Thanks Shrinath Dagabaj
CVE Identifiers (also called "CVE names," "CVE numbers," "CVE-IDs," and "CVEs") are unique, common identifiers for publicly known information security vulnerabilities. CVE identifiers have "entry" or "candidate" status. Entry status indicates that the CVE Identifier has been accepted to the CVE List while candidate status (also called "candidates," "candidate numbers," or "CANs") indicates that the identifier is under review for inclusion in the list.


Each CVE Identifier includes the following:
  • CVE Identifier number (i.e., "CVE-1999-0067").
  • Indication of "entry" or "candidate" status.
  • Brief description of the security vulnerability or exposure.
  • Any pertinent references (i.e., vulnerability reports and advisories or OVAL-ID).

The operating system is the most fundamental program that runs on your computer. It serves as the basis for how everything else works. 

  What is an operating system?

An operating system (OS) is the main program on a computer. It performs a variety of functions, including
  • determining what types of software you can install
  • coordinating the applications running on the computer at any given time
  • making sure that individual pieces of hardware, such as printers, keyboards, and disk drives, all communicate properly
  • allowing applications such as word processors, email clients, and web browsers to perform tasks on the system (e.g., drawing windows on the screen, opening files, communicating on a network) and use other system resources (e.g., printers, disk drives)
  • reporting error messages
The OS also determines how you see information and perform tasks. Most operating systems use a graphical user interface (GUI), which presents information through pictures (icons, buttons, dialog boxes, etc.) as well as words. Some operating systems can rely more heavily on textual interfaces than others.

How do you choose an operating system?

In very simplistic terms, when you choose to buy a computer, you are usually also choosing an operating system. Although you may change it, vendors typically ship computers with a particular operating system. There are multiple operating systems, each with different features and benefits, but the following three are the most common:
  • Windows - Windows, with versions including Windows XP, Windows Vista, and Windows 7, is the most common operating system for home users. It is produced by Microsoft and is typically included on machines purchased in electronics stores or from vendors such as Dell or Gateway. The Windows OS uses a GUI, which many users find more appealing and easier to use than text-based interfaces.
  • Mac OS X - Produced by Apple, Mac OS X is the operating system used on Macintosh computers. Although it uses a different GUI, it is conceptually similar to the Windows interface in the way it operates.
  • Linux and other UNIX-derived operating systems - Linux and other systems derived from the UNIX operating system are frequently used for specialized workstations and servers, such as web and email servers. Because they are often more difficult for general users or require specialized knowledge and skills to operate, they are less popular with home users than the other options. However, as they continue to develop and become easier to use, they may become more popular on typical home user systems.