Sunday, 5 May 2013

Latest Advanced Remote Keylogger-Project Neptune


Keyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So hackers mainly use keyloggers to steal your passwords, creditcard numbers and other confidential data. Spyware or keylogger is a type of malware that can be installed oncomputers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. Read more about Spywares.We have seen some methods to protect ourself from keyloggers. We have also discussed some methods for creating our own keyloggers with Ardamax and keyloggers with Apolyse.

But here we are using a keylogger from Project Neptune.Which have the properties likeEmail or Ftp log delivery,Self destruction and so on.

DOWNLOAD LINK


HOW TO SET UP A KEYLOGGER

1 .Extract all the files from the downloaded archive and open Project Neptune you will see a window as shown below.(click on image to enlarge and do as per screenshots recommended)



2. Now can either use Email delivery or Ftp delivery of your logs.I am here using a Email delivery for explanation.Its better use a fake account as Email account.But make sure that username and password are correct.and give the id to where you want to get your logs.

3. Once you entered all the account informations you can click on Test Email Account Information to test the mail.You will get a test mail to address to which you provided.If successfull proced to next step.

4. In next tab select as per seen below in screenshot,You can give your own settings if you want.Its all depend on you .


5. In next tab as shown below, Select the installation and working directory for your keylogger



6. In extra options tab you can also set a self destruction date so that this virus will removed itself in that given date.


7. In the Server Creation tab You can give the name and description for your virus and finally click on Generate New Server Button as shown below to create keylogger



Thats it you have successfully created a keylogger.

You can also read Some crypting and binding techniques to make a virus file FUD.

NOTE : This detailed description of keylogger is given only for creating awareness and please dont use it for any harmful purposes.We believe that You can be secure only if you know What is Hacking. Know Hacking But No Hacking Thats the aim of RealHackings.

No comments:

Post a Comment