Skip to main content

HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER

HOW TO HACK FACEBOOK ACCOUNTS USING KEYLOGGER



STEP 1: Create Server for Hacking Passwords


First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victim’s machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:


1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search. 


2. Extract the RAR file. Now you will get one folder and three files.


3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account.


4. Click on server settings as shown. Here, enter the time at which you want to receive reports; it’s always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional.


5. Click on Log and Result Setting. In Log Email Title enter the subject of email like “my keylogger report” or anything else that you you like. Click the last two options that add computer name and add the victim’s name.


6. Now click on “Other Options.” In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message – so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.


7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.


 8. Now your keylogger server is ready for you to hack Facebook accounts. 



Step 2: Extracting the icon file from any installer (resource hacker)


1. Open the resource hacker folder and select the reshacker file.


2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker. 


3. In the menu, there is one action button. Click on it and then click save all resource.


 4. Save all the resources to the desktop or any other location of your choice.


5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.


6. That leaves us with the icon of installer file (Ccleaner setup icon).


Step 3: Bind the Keylogger server with any software


1. Go to keylogger folder and open the Binder.


2. Click on the button shown below to add files.


3. Add the keylogger server and the setup software (in our case it’s Ccleaner setup).


4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown in the figure.


5. Now again go to file’s menu in Binder and click on Bind files.


6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.


Step 4: How to spread the keylogger


1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)


2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.


3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive. 


Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.


Hacking someone’s Facebook account takes more than a few minutes

Anandu Aman

Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colle...

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren...

Copilot - Microsoft is gearing up to introduce its AI companion

 Microsoft is gearing up to introduce its AI companion, Copilot, this upcoming fall season. The highly-anticipated rollout is scheduled for September 26, with Copilot poised to seamlessly integrate with various Microsoft services, including Windows 11 and Microsoft 365. Additionally, enterprise customers can look forward to the availability of a new AI assistant, Microsoft 365 Chat, starting in November. Copilot, described by Yusuf Mehdi, Corporate Vice President and Consumer Chief Marketing Officer at Microsoft, as an "everyday AI companion," aims to make your daily workflow smoother and more efficient. Its primary goal is to embed an AI-powered "copilot" within Microsoft's most popular products, ensuring widespread accessibility. What distinguishes Copilot from other AI assistants is its focus on integration. Rather than operating in isolation within specific applications, Copilot promises a seamless user experience across multiple Microsoft products. This com...