Rinlogger is one of my all time favorite keyloggers with which you can create a FUD server and hack your victims computer and his social networking, banking accounts etc.
FUD means fully undetectable. You can also crypt the server you created and make them completely undetectable to almost all the antivirus softwares available.
With rinlogger you can also bind the server with images, other apps etc.
Procedure for making FUD sever using Rinlogger:
First of all download rinlogger from the link below. Then extract it and run the application. Then
1. Click on Create New.
2. Fill the entries accordingly :
Email Address : email-id where you want to receive all the logs.
Account Password : Password of your email-account entered above.
Keylogger Recipients : Enter your email and hit on add and then hit on Next.
3. Enable attach screenshots if you want to receive them.
Enable if you want to colourise keylogs.
Enter Time duration between 2 mails.
Verify Now. =>"A connection was able to establish properly!" and you will receive a mail about verified SMTP server test. Click ok on the newly appeared dialogue box and then Next.
4. Now Enable the Install Keylogger.
Set installation Path to Startup.
Give it a file name of your wish say logger. Then
Click on Next.
5. Enable downloader if you want otherwise and press next.
6. Dialog Setup is an optional box. Fill them fields if you want or you can skip them and hit Next.
7. Enable Website Viewer and hit Next.
8. File Binder, again an optional feature. You may enable it to embed multiple files into the keylogger. Enable it and add the files which you want to place with keylogger in File Binder Setup. Then hit '+'. I added only 1 file named key.txt. You can add more than 1 file. Now click on Next.
9. Password Stealers : Enable all the fields here and press Next.
10. Skip Administrative Tasks and hit Next.
11. File Properties Setup : Hit on '?' to generate random product information. Hit Next.
12. Save the file where you want to put it. Compile it. Hit Next.
13. You are done. Now send this file to the victim. When the victim runs the file the keylogger will automatically be installed on his/her system silently in background. You will receive the logs of the victim on the email-id provided earlier.
14. Thats it. Enjoy...!!!
0 nhận xét