There must
have been at least once that you really wanted to hack the Email account of your
girlfriend/boyfriend, or of an employee you thought was passing on your trade secrets, or
a friend who was speaking ill behind your back. What did you do then? Spend
hours surfing the internet for one viable option. Well, I will be providing you
with some basic proven methods for email hacking, and ways to prevent your own
computer from viruses (especially Trojan horse), and you don’t need to have a
technical degree to implement these stuff.
EMAIL HACKING
The most
basic method to hack someone’s email is to send them a “key logger”.
Now the
question arises, what is a keylogger?
A keylogger
is nothing but a script (program) running in your computer, but is hidden from
anyone using the computer. What it does is, it stores all the keystrokes (keystroke
is the key struck in a keyboard) and sends you an email (in case
of a remote keylogger) or allows you to view a log (the text file, containing
all the data that was gathered while saving the keystrokes) containing the data about all the keys that have been struck. You can easily
extract someone’s password using this method. How?
What do you
do immediately after entering your email in any website?
You type in
your password.
So all you
need to do are given in the following steps:
1. Open the
log
2. Press
Ctrl + F (Control + F) in your keyboard together (This is the find option in any
text file)
3. Type in .com (read dot then com without any space)
4. Continue
doing this until you reach a part, where you get the required persons email id
5. The
immediate text following the .com is the required password for that email id
(This stands true for most of the cases, unless people employ precautionary
measures against keyloggers, such as typing some random text before typing in
their passwords)
Now the
question arises, which keylogger should you install? This is because most of
the keyloggers are detectible by an antivirus. If it’s your own computer you
are installing the keylogger to, it is fine, since you can disable the antivirus
before installing the keylogger. Some free keyloggers I would recommend for installing in your own computer are:
1.
Actual
Keylogger. You can download it from
2.
Home
Keylogger. You can download it from
3.
Kidlogger.
You can download it from
But if it is
a remote keylogger that you want to install, I would recommend only a couple of
keyloggers. This is because, all of the rest that I have tried, have easily been
detected by antivirus’. These software’s are often paid ones. The couple that I
recommend is:
1.
System
Surveillance Pro. You can download it from
2.
Spytector.
You can download it from
The next
step is to actually show you how to install one of these software’s. I will
take Actual keylogger as an example.
1. Open your
web browser, and goto the page http://www.actualkeylogger.com/download-free-key-logger.html
2. Click on
the Download Keylogger Button as shown
below
3. Your
download will begin shortly. On completion, click on the file actualspy.exe (the
name in which you have downloaded the file). This will start the installation
process.
4. Click
next in the first step and select “I accept the agreement” and again click on
next.
5. Set the
path in which you want to install the keylogger and again click on next. Give a
name in which you want to install the software and click on next.
6. Tick the “Create a desktop icon” box, if you
want to create an icon for the keylogger in your desktop. I would recommend not
to do this, since everyone who uses your computer will be able to look at it,
and it goes against the very policy of installing a keylogger. Click next.
Click on install in the next step
7. Click on
finish in the next step. If in this step your antivirus flashes a warning, you
need to ignore it. This is because a keylogger is a monitoring software, and it
is a virus in the eyes of a keylogger.
8. You will
be taken to a folder containing the software. In this folder, double click on ActualSpy
icon. This is the actual application.
9. On
opening, you will be said “this is an unregistered version”. You are to click
on the “enter registration code” button and type in this code:
0iU0DOkvQS/fLQ1Hxo5efM8O5q12ZW
ClEJ4De+0Rw8WG2lcgbkJTQqXvOcPM
iw3/fvztayACVcGvys9Fk98Sepc+Yl
d+5Z+EiTZwvPuCqGa8gLs2oC/X8POr
mO99+d59DYcdXjzqWwq5zzV6P2CSaG
p+nz5YbUbuKvEmp8w2vp+g=
ClEJ4De+0Rw8WG2lcgbkJTQqXvOcPM
iw3/fvztayACVcGvys9Fk98Sepc+Yl
d+5Z+EiTZwvPuCqGa8gLs2oC/X8POr
mO99+d59DYcdXjzqWwq5zzV6P2CSaG
p+nz5YbUbuKvEmp8w2vp+g=
10. Your
software is now registered.
11. Click on the settings button before starting the monitoring activity. Settings will allow you to set the size and frequency of your log file. It also has various options for sending you the log file. We will choose the email option.
12. In the report sending tab, we will set our email settings.
For email, we need to set our smtp server settings. We will be using yahoo smtp server. I would recommend you not to use gmail smtp server, as gmail easily detects the monitoring software, and hence doesn't allow you to send or receive emails. Click on the "settings" button just below the port field.
13. You need
to put in:
From address
as: yourmail@yahoo.com
Smtp server
as: smtp.mail.yahoo.com
To address
as: yourmail@yahoo.com
Click on
authentication and type in your yahoomail password in it.
Click on OK button next.
Click on OK button next.
14. Now set your email address as yourmail@yahoo.com. Then click on Send test message. You will get a similar box saying the test report has been sent. On opening your yahoo account, you will see the test report.
15. Your keylogger has been installed. You will now get reports from time to time.
For any more
queries, please contact me on:
I will be glad
to guide you further.
The second part of this series will tell you how to protect yourself from hacking attacks. It will also discuss how to attack a few websites.












No comments:
Post a Comment