Passwords hacking method
KEY LOGGING
Key logging is an art of hacking where you have physical access to the computer and its hardware ports for the keyboard. By using undetectable hardware, you can record every key your victim presses on their keyboard, revealing their account passwords so you can hack them.
Stealth is a key trait of any good hacker. The next key trait is vanishing without a trace. Keyloggers are great because you can hack anything with them, install them without being tracked by McAfee Antivirus, and leave with your victim’s passwords without them ever knowing.
View an image of a USB Port
Warning: The picture above also labels lightning ports. Make sure you don’t confuse your USB ports with lightning, FireWire, or serial port and try to plug the keylogger in. It will not work.
View an image of a PS/2 Port
COMMON USES FOR KEYLOGGERS
- Find out if your husband/wife/boyfriend/girlfriend is cheating on you by getting their passwords and hacking their e-mail or dating web site account.
- Get the password your parents set on the web filter so you can go to any site. You can also do this at school like I did.
- Record your victim’s internet history and what they type into web sites.
- Get your teacher’s computer password to change your grades.
HARDWARE PORTS
One of the most technical things about hacking is ports. There are software ports (examples include things like Bluetooth and Telnet) and hardware ports that you plug hardware into (things like FireWire devices and RAM). Keyloggers deal with hardware ports, and luckily keyboards only use two: USB and PS/2.USB
USB ports are becoming really popular because they’re fast. They’re used not only for keyboards, but also printers, cameras, cell phones, wireless network/Wi-Fi cards, GoPros, and even XBox 360 controllers.View an image of a USB Port
Warning: The picture above also labels lightning ports. Make sure you don’t confuse your USB ports with lightning, FireWire, or serial port and try to plug the keylogger in. It will not work.
PS/2
PS/2 can be easily identified because they’re always purple, which is nice because you can find them quickly (good hackers are always fast). The only device that uses PS/2 is the keyboard, unlike USB, so you won’t have to worry about hooking the keylogger up to the wrong device. All you’ll need to do is look for the purple port on the back of the computer and install the keylogger.View an image of a PS/2 Port
Comments
Post a Comment