Hello, here method to hack the hackers..If you have a keylogger on your computer, and you know the file, this process will easily give you the FTP website they are using so you can get the logs for the files, and if they use the same keyloggers on other computers, you’ll get the logs for that to.
What is Reverting ?
Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action. For this we will need a key logger server using ftp. It can be found on warez sites, you tube etc.
What is Reverting ?
Reverting generally means reversing an action or undoing the changes. Here in our case, reverting would be more of reversing the action. For this we will need a key logger server using ftp. It can be found on warez sites, you tube etc.
Tools needed:
1) Key logger, pass stealer
2) Cain and Abel
3) Virtual machine (so you don’t get infected, and what if the hacker is using better protocol that’d be epic fail)
1) Key logger, pass stealer
2) Cain and Abel
3) Virtual machine (so you don’t get infected, and what if the hacker is using better protocol that’d be epic fail)
2.) Now run Cain and Abel and do the following things as per stated order.
4.) As you can see the key logger used ftp protocol to transfer the logs. Ftp protocol isn’t very safe since it doesn’t encrypt the data. Anyways you should see the ip address where your pc issending packets. And also the user name and password. This might not work if the server is using other protocol like http smtp etc you’ll most probably get junk values in user and pass box if those protocols are used.
4.) As you can see the key logger used ftp protocol to transfer the logs. Ftp protocol isn’t very safe since it doesn’t encrypt the data. Anyways you should see the ip address where your pc issending packets. And also the user name and password. This might not work if the server is using other protocol like http smtp etc you’ll most probably get junk values in user and pass box if those protocols are used.
5.) Now you have username and pass from “Cain and Abel” … So Login and Hit The Hacker!!!!
Hope that ,this article will be helpful for you, now go and collect all viruses and try this method… Hope u will get good Results..
No comments:
Post a Comment