Advertisemen
Hello Friends, in my previous post i have explained 4 ways to hack Facebook accountpassword, where i have discussed the second best method to hack Facebook password is using Keyloggers. Today i will explain you how to hack Facebook password usingkeylogger.
Today i will explain you in detail with snapshots how to create your Facebook hackerkeylogger, its a 100% Fully undetectablekeylogger you can check this file using Virus total. Its a 100% FUD remote keylogger with several advanced features.
Today i will disclose you how i hacked 19000+ accounts, its so easy that anyone can do it. On my website you will never get any infected tool. If you have any doubt or feel something suspicious always test the link or file with virus total website before downloading. Never believe any website including mine also, always scan download links with virus total website or any such website before downloading it. Download it only when it does not have any virus.
Hack Facebook password using Keylogger Involves following steps:
1. Create your Server that will hack passwords.
2. Extract the Icons from any software
3. Bind the Keylogger to make it Hidden
4. Spread your keylogger to victims
Note: This tutorial is for Educational Purposes only. I and Hackingloops is not responsible for any misuse of knowledge.
Let's start Facebook hacking tutorial in detail :
STEP1 : Create Server for Hacking Passwords
First of all for hacking any facebook account password, we have to create ourkeylogger server that will run on victims machine or PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keyloggerserver building process consists of several steps.
The steps involved are mentioned below in detail:
1. First of all download the Keylogger.
Download Keylogger from here:
CLICK HERE TO DOWNLOAD
DOWNLOAD BINDER HERE:
CLICK HERE TO DOWNLOAD BINDER
2. Extract the RAR file . Now you will get one Folder and three files as shown in below snapshot:::::::::::
3. Now open the Keylogger file. Here you will need gmail ID and password. For safer use create a fake Gmail account and use it here as shown below:
4. Now Click on server settings as shown. Here enter the time after which you want to receive reports, its always preferable to use 20 min timer for receiving files. And Click on Output box to choose location of file and give it any name. Its always recommended to use system process name to make it undetectable like svchost or check any process name from your task manager and name it. Other fields are optional. The complete snapshot is shown below:.........
5. Now Click on Log and Result Setting. In Log EMail Title enter the subject of email like Mykeylogger report or simply my report or something else that you like. Also Click the last two options that i.e add Computer name and add victim name. The snapshot is shown below:
6. Now Click on Other Options. In this section you just have to do one thing. Most hackers prefer warning message POP up but I love keylogger using any message. So unclick message button. Because when you bind it with any other software then it should not any warning messages otherwise it will be detectable.
7. Now at last click on Build Keylogger. Now after you click on it you will see your keyloggerfile at location that you have chosen in 4th step. Now this keylogger server file will be used to bind with any other software in Binding Step.
8. Now you keylogger server is ready that you will use to hack Facebook accounts. That's all for the server creation step now move to second main step.
Step 2.: Extracting the Icon file from any installer(resource hacker)
1. Open the Resource hacker folder and open the reshacker file.
2. Now go to its menu and open any setup file. Suppose we want to attach our keylogger to Ccleaner setup file. So open the Ccleaner setup with resource hacker.
3. Now in menu there is one action button click on it and then click save all resources.
4. Now save all the resources to desktop or any other location of your choice.
5. It consists of two files one is icon file and other is res file . We only need icon file, so you can delete the other file i.e res file.
6. Now we have Icon of installer file(as discussed above Ccleaner setup Icon).
Step 3: Bind the Keylogger server with any software
1. Now Go to keylogger folder and open the Binder .
2. Now Click on + button given below to add files.
3. Now add the keylogger server and the set up of software (i.e. in our case it's Ccleaner setup).
4. Now in menu of Binder, Go to Settings. There select the icon that we have generated in the previous step and set the location of output file as shown in figure.
5. Now again go to File's menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. Now you have to spread it or send it to the victim that is your friend.
Step4 : How to Spread Keylogger or send it to victim or friend
1. Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keyloggerattached with it.
2. Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keyloggerin form of software posts. You can use various software's to spread them that users frequently download.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that haskeylogger attached with it.
Note: you can also attach keylogger with images also. But that can be detectable by antivirus. So avoid such type of hacking.
So isn't that so easy to hack anyone's Facebook account in just few minutes.
How to protect yourself from these hacks?
Prevention is always better than cure so always follow these steps:
1. Don't use cracked softwares and don't download them from unauthorized websites.
2. Always keep your antivirus and anti-spyware up to date.
3. Always scan the files before transferring them to your USB.
4. Do not allow other users to use your PC i.e password protect it.
Note: Hacking Email accounts is illegal. This post is just to aware you how easy is to hackFacebook and email accounts. So that you cannot fall into the traps of hackers............
Only For eductaional purpos
Add Comments