Home » » What is Keylogger, RAT, Stealer, Shell, Phisher for newbs frendly [TUT]

What is Keylogger, RAT, Stealer, Shell, Phisher for newbs frendly [TUT]




Hello Friends Today i will explain what are this programs and how they work
All is for noobs and newbies:
Oke Let's start

  Here I will explain some basics of hacking Include keyloggers, shell's, binders crypter stealer, phisher, brutforce-ve, types of web attacks and protect ... So to begin.

--------------------------------------------------------
1) Keylogger - The attacker needs to infect the victim server, so by the victim to run the server, whether it be based on lies, or request an application, it does not matter ... When the victim server starts, it will itself automatically every 5 or 10 or 15 .. minutes to send the e-mail or FTP attacker everything the victim is knocked ... Some keyloggers are more options ... For example, to prohibit the task manager, regedit, run, and also take a snaps of your pc after some time laps your chat logs web visited logs every thing will b mailed to hacker ... For Windows platforms, for protection against keyloggers the best program KeyScambler.
---------------------------------------------------------------------------------
2) Shell - Shell is a php or asp file that is used in the attack on the website He does not exactly serve to attack, but when uploading to a site through it can see all the files in FTP. It has the option to self- upload files, change files, it deletes files edit files and many other options. It is also used in the attack on the RFI web sites, and on the attack I will talk a little later. Protection of the shell does not exist for the computer, only for the sites.
--------------------------------------------------------------------------
3) Binder - Binder programs that serve to combine two files into one. Most often used to bind server from keyloggers, rat-a,-a istealer. Binder contains 2 files. Builder and Pillar. The builder-inserted into the files and bind. Pillar is there done that function. It is not harmful to the computer if it is not a virus binded.
------------------------------------------------------------------------------
4) Crypter - Crypter programs that serve to reduce the detection of a server or something else. Also as a binder containing two files. Crypter (the name is arbitrary) and Pillar (often so called). Crypter serves only crpyt file, and as great as the detection of so many steps and will be the detection of the encrypted file when. Crypters are divided into 2 groups. FUD and UD crpyt. FUD (Fully Undetectable) - No anti-virus can not detect encrypted file as a virus, and UD (Undetectable) - Only a few anti-viruses are not detected. It may be that they do not detect an anti-virus, and can be for example 15 ... It is not harmful to the computer if it is not a virus binded.
------------------------------------------------------------------------------
5) Stealer - Stealer is a program that serves the victim when it starts to pick up all the saved passwords in computer (the web browser, MSN, Skype,mozila etc ...) The most famous is istealer stealer .... Stealer is from a batch file and a php-logger. The first file is the basis of the program in which the real server, the link puts the php logger's (I will explain it after), PHP Logger - usually contains 2 files - index.php and style.css ... Here are the logs of the victims recorded in any other way ... While the real server must be entered from the index.php file link for example ... www.logoviodstealera.com / index.php <--- must be put index.php ... When the victim starts there server logs will be entered ... Php-logger files and be put on a free / paid host ... Databases must be created that could use the php logger, in order to see the logs you'll need to log data to enter in index.php ... Here are the lines that need to be amended to make it work stealer ...It is surrounded by computers, only use a good anti-virus, Avir my recommendation ... But if the server can only FUD to be careful not to infect ... My advice is to run all the programs you are unsure of the program called sandboxed .
---------------------------------------------------------------------------
6) RAT - RAT (Remote Administrator Tolls) ... RAT is the best for me if you want to infect the victim with some server-om (keylogger, stealer, etc.) ... He has the best options ... For example, every war has an option that can run when the victim server that can get into his computer without his knowledge, to open and close the CD Room, the camera turns to the press, and also have some options as a keylogger or a stealer ... Now an important note for WAR ... You control the victim through the program in which you made a server ... Oh now ... Victims are recorded per IP and therefore is used by No-Ip DUC ... At the end of the tutorial put links to some programs and the SS .
------------------------------------------------------------------------
7) Phisher - Phisher site is a fake ... For example ... You take in the facebook page save it as index.php and take and write a script that will not record logs So for example you take the cover with a second message type See facebook, just log in to current account and log on when it will in most cases (and depending on options) redirektovace it on facebook.com page and you will be in a file named eg (logs.htm) to enter email and password that the household (eg in this format) email = passwod = .... Phisher can be made ​​for each page that has a login (usually facebook, twitter, skype, msn) ... Always check when you enter data that is not a fake site, ie. phisher
-------------------------------------------------------------------------------
8) bruteforce - Here is a bruteforce program will explain it with simple example ... Until recently he could to try to hack facebook acc brutforcom but the facebook team introduced that after a certain number of failed logins to seek confirmation captcha ... Facebook for the radio so his way to type in an email from a facebook user you want to hack the program if I am not looking for wordl list with possible codes, that insert themselves and start clicking ... The program will I try to log in to the given email and given the possible codes ... This is a bruteforce .... Not dangerous for PCs but if it does not run, for it has bind a virus ...
----------------------------------------------------------------------------
thanx for readimg..

0 comments:

Post a Comment