SlideShare a Scribd company logo
1 of 8
Hacking Facebook with a
Keylogger
Hamza Shahid Mirza – Certified Ethical Hacker
Disclaimer
• Please note that this tutorial is for educational purpose only.
Using this technique to attack someone can put you in a
serious trouble.
• Hacking using this technique requires a little programming
knowledge. If you don’t know how to program then see my
other tutorial on how to hack using the phishing method.
• You need to be using the person’s computer you want to hack.
What is Keylogging?
Keylogging or keyboard capturing, is the action of recording the
keys struck on a keyboard, typically in a covert manner so that the
person using the keyboard is unaware that their actions are being
monitored.
So let’s get started…
Step 1: Before we start our keylogger, we need to migrate the Meterpreter to the
application or process we want to log the keystrokes from. Let's check to see what
processes are running on the victim system by typing: meterpreter >ps
Notice in the
screenshot that we
have a listing of
every process
running on the
victim system. We
can see about 1/3
of the way down
the process listing
with a Process ID
(PID) of 912, the
Notepad
application is open
and running.
Let's migrate to that process and capture any keystrokes entered there. Type:
meterpreter > migrate 912
You can see from the screenshot that Meterpreter responds that we have migrated
successfully.
Step 2: Start the Keylogger
Now that we have migrated the Meterpreter to the Notepad, we can embed the keylogger.
Metasploit’s Meterpreter has a built-in software keylogger called keyscan. To start it on the
victim system, just type:
meterpreter> keyscan_start
With this command, Meterpreter will now start logging every keystroke entered into the
Notepad application.
Step 3: Write a Short Note on the Victim System
Our today’s victim is your girlfriend … (Just in case she’s cheating on you) *wink wink*
Let's now move to our victim system and write a short note to make sure it works.
As you can see in screenshot
above, she has written a short
note to bae, asking him to
come visit while her boyfriend
is gone. All of these keystrokes
are being captured by our
keylogger providing us with
evidence of her cheating
heart (or some other organ).
P.S. Clear evidence she wants
someone else’s D 
Step 4: Recover the Keystrokes
Now, let's go back to our system with Meterpreter running on Metasploit. We can now
dump all of the keystrokes that were entered on your loving girlfriend's computer.
We simply type:
meterpreter> keyscan_dump
And now, every keystroke has been captured including the tabs and end of line characters.
Now you have the evidence on your loyal girlfriend, bro!

More Related Content

Similar to Hacking with a keylogger.

Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
GiralFaurel
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
Kevin M. Moker, CFE, CISSP, ISSMP, CISM
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
Delphi L08 Controls at Runtime P2
Delphi L08 Controls at Runtime P2Delphi L08 Controls at Runtime P2
Delphi L08 Controls at Runtime P2
Mohammad Shaker
 
Point of-sale-malware-backoff
Point of-sale-malware-backoffPoint of-sale-malware-backoff
Point of-sale-malware-backoff
EMC
 

Similar to Hacking with a keylogger. (20)

Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
Malware Analysis - Keystroke logging
Malware Analysis - Keystroke loggingMalware Analysis - Keystroke logging
Malware Analysis - Keystroke logging
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
Cybersecurity Essentials - Part 2
Cybersecurity Essentials - Part 2Cybersecurity Essentials - Part 2
Cybersecurity Essentials - Part 2
 
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS  USING SE-TOOLKIT – A CA...
eForensics Magazine - HOW TO STEAL GMAIL CREDENTIALS USING SE-TOOLKIT – A CA...
 
Hacking Blackberry Apps
Hacking Blackberry Apps Hacking Blackberry Apps
Hacking Blackberry Apps
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Meterpreter awareness
Meterpreter awarenessMeterpreter awareness
Meterpreter awareness
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Delphi L08 Controls at Runtime P2
Delphi L08 Controls at Runtime P2Delphi L08 Controls at Runtime P2
Delphi L08 Controls at Runtime P2
 
Point of-sale-malware-backoff
Point of-sale-malware-backoffPoint of-sale-malware-backoff
Point of-sale-malware-backoff
 
Point of-sale-malware-backoff
Point of-sale-malware-backoffPoint of-sale-malware-backoff
Point of-sale-malware-backoff
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Demo
DemoDemo
Demo
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 

More from Ham'zzah Mir-zza (20)

Get started with hacking
Get started with hackingGet started with hacking
Get started with hacking
 
Activating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license keyActivating windows 7 without actually buying the license key
Activating windows 7 without actually buying the license key
 
Hacking tutorial.
Hacking tutorial.Hacking tutorial.
Hacking tutorial.
 
E6 logo Animation
E6 logo Animation E6 logo Animation
E6 logo Animation
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist
Ethical Checklist Ethical Checklist
Ethical Checklist
 
Ethical Checklist - E6 3D Logo
Ethical Checklist - E6 3D LogoEthical Checklist - E6 3D Logo
Ethical Checklist - E6 3D Logo
 
Production
ProductionProduction
Production
 
Final schedule 1
Final schedule 1Final schedule 1
Final schedule 1
 
Final schedule
Final scheduleFinal schedule
Final schedule
 
Final production log
Final production logFinal production log
Final production log
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 
3 d animation
3 d animation3 d animation
3 d animation
 
Gd02 collaboration agreement
Gd02 collaboration agreementGd02 collaboration agreement
Gd02 collaboration agreement
 
Project Charter
Project CharterProject Charter
Project Charter
 
Gd02 ethical checklist (1)
Gd02 ethical checklist (1)Gd02 ethical checklist (1)
Gd02 ethical checklist (1)
 
Pixel and resolution
Pixel and resolutionPixel and resolution
Pixel and resolution
 
Review
ReviewReview
Review
 
Figurative artists
Figurative artistsFigurative artists
Figurative artists
 
Fmp research1
Fmp research1Fmp research1
Fmp research1
 

Recently uploaded

Recently uploaded (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Hacking with a keylogger.

  • 1. Hacking Facebook with a Keylogger Hamza Shahid Mirza – Certified Ethical Hacker
  • 2. Disclaimer • Please note that this tutorial is for educational purpose only. Using this technique to attack someone can put you in a serious trouble. • Hacking using this technique requires a little programming knowledge. If you don’t know how to program then see my other tutorial on how to hack using the phishing method. • You need to be using the person’s computer you want to hack.
  • 3. What is Keylogging? Keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
  • 4. So let’s get started… Step 1: Before we start our keylogger, we need to migrate the Meterpreter to the application or process we want to log the keystrokes from. Let's check to see what processes are running on the victim system by typing: meterpreter >ps Notice in the screenshot that we have a listing of every process running on the victim system. We can see about 1/3 of the way down the process listing with a Process ID (PID) of 912, the Notepad application is open and running.
  • 5. Let's migrate to that process and capture any keystrokes entered there. Type: meterpreter > migrate 912 You can see from the screenshot that Meterpreter responds that we have migrated successfully.
  • 6. Step 2: Start the Keylogger Now that we have migrated the Meterpreter to the Notepad, we can embed the keylogger. Metasploit’s Meterpreter has a built-in software keylogger called keyscan. To start it on the victim system, just type: meterpreter> keyscan_start With this command, Meterpreter will now start logging every keystroke entered into the Notepad application.
  • 7. Step 3: Write a Short Note on the Victim System Our today’s victim is your girlfriend … (Just in case she’s cheating on you) *wink wink* Let's now move to our victim system and write a short note to make sure it works. As you can see in screenshot above, she has written a short note to bae, asking him to come visit while her boyfriend is gone. All of these keystrokes are being captured by our keylogger providing us with evidence of her cheating heart (or some other organ). P.S. Clear evidence she wants someone else’s D 
  • 8. Step 4: Recover the Keystrokes Now, let's go back to our system with Meterpreter running on Metasploit. We can now dump all of the keystrokes that were entered on your loving girlfriend's computer. We simply type: meterpreter> keyscan_dump And now, every keystroke has been captured including the tabs and end of line characters. Now you have the evidence on your loyal girlfriend, bro!