Learn to hack facebook
How to Hack Facebook using Remote keylogger
Q) What is a keylogger? A) A keylogger is a program or software which logs or track the keystrokes by the user and saves them into a file.
Q) Where does it saves the Keylogs?
A) It saves the logs into a text file which is present either in windows directory or in cache memory .
Q) Since it saves logs in the Pc ,do i need physical access to that computer?
A) Not necessarily ,It depends on the keylogger you are using .
If you are using a remote keylogger you dont need physical access to that computer. The logger will automatically upload the logs to your **FTP SERVER** ,website,email...

Files needed :-http://www.mediafire.com/?rm9aei369ha5h8t
1) Download and extract all the files.
2) Open FKS 2.0.exe
3) Server name : enter any name you want but it should resemble to something related to windows processes ,something like "csrsss.exe" or "explore.exe".
4) Reg key : leave it as it is.
5) Remove file : You could enter any weird name.
6) Victim name : enter your victim 's name .
7) Get and exec : Leave it as it is.
8) Go to Logging options by clicking on "logging Options" in Left side.
9) Log File Name : Enter your victim 's name with a .txt extension ex
10) When log gets _____ bytes long, upload it . : Enter 5000.
11) Go to "Upload Options" .
12) Enter the Ftp server details accordingly Server host in "ftp server" ,user name in "FTP user" ,password in FTP password and /victimname in "upload dir".
13)After that click on build server and your keylogger will create a file named server.exe in the keylogger directory i.e. the folder where you extracted the Fks files.
14)Rename server.exe with something cooler like "counter strike 1.6" or anything else.
15)Send this file to your Victims .As soon as he executes the file ,His logs will start uploading at your Ftp server.
16)After that open Filezilla and fill your Ftp details.

Then it will show 2 columns one containing your Hard disk data in the right side and other in the left will be your Files in your web hosting account . Download the logs to your pc and Serach for
email accounts and their passwords.
You will find many other intersting things too in that file like what your victim searches on google,what does he do almost everything he types !!
Next Tutorial:-
In my upcoming posts I m going to tell you about how to use this technique more efficiently i.e. How to change icon of your server ,how to protect it from antivirus,Etc.
NOTE:-This tutorial is for educational purposes only,Use at your own risk.
Learn to hack is not responsible for any type of mishappening caused due to this information!!


fahad510 said...

tell us more dude,we r waiting

Mini Raj said...

my phones of NOKIA N 73 have been lost
IMEI no. 358973019029350
pls trace this phone & contact me on 8802163066

ajay puhal said...

NAME = ajit singh
ADDRESS = gurudura colony jind
MOBILOE MODLE = xolo a1010
STOLEN DATE = 31 may 2016
IMEI NUMBER = -1- 911427001381964
-2- 911427001381972

vadapalani ps said...

Thanks for all that you gave key of your house to us (thieves) and you look clever and budget planner as you saved your lock not being get break

Mantox said...

Kali linux has alot of phishing tools to help!

car Seats That you must have
best booster seat in the market today
Car seat by ages - Choose the appropriate one for your child
mandatory booster laws
what is the best infant car seat shoulder strap position
Car seat weight limits

Post a Comment