Requirements:

1.The Server of the Keylogger/Stealer
          If you are already hacked than open Task Manager by pressing Ctrl+Shift+Esc and goto Precesses tab and you will find something like this.

     or it will be something like 'iexplorer.exe''server.exe' in the 'Image line' Row and will not have a Description or will have any rubbish type of Description!
        Right click on that and click Open File Location.And you will get the location of the server.
2.Virtual Machine(Windows)
          So if you don't get infected, and what if the hacker is           using better protocol that would be epic fail.
3.Cain and Abel(in your Virtual Machine
          (Get it from here if you don't have)



Steps:

1.Open the Server of Keylogger/Stealer in the Virtual Machine
2.Open Cain and Abel and do the following steps
          1.Open Sniffer Tab
          2.Click on the Start button
          3.Goto Passwords Tab(bottom)



















3.Wait for sometime and check back the Passwords area



















         As you can see the keylogger used ftp protocol to transfer the logs. Ftp protocol isn't very safe since it doesn't encrypt the data. Anyways you should see the IP address where your PC is sending packets. And also the username and password. This might not work if the server is using other protocol like http, smtp, etc. you'll most probably get junk values in user and pass box if those protocols are used.

Now go here enter hackers ftp server Username

and Password (first type the server in address bar and check which webhosting site he is using)if he is using 000webhost then go here(u will get an error of the site and you can know which site is it)Like the error below (the error will be redirected to another site sometimes so check it carefully)

Now you know what to do !
My opinion is steal the logs quietly and remove important data of your's from his logs ! And get the other one's too! (if he is hacking someone else too from his ftp server)





















First of all before hackers make their keyloggers and searching for victim but after this u guys will be searching for the keyloggers and hack the hacker back!Troll



Thanks for visiting our Blog!

Post a Comment

 
Top