Happy New Year

Happy New Year

Facebook Password Cracker Hack Facebook Account Using Keylogger

Facebook Password Cracker | Hack Facebook Account Using Keylogger
The first line of defense for many computers is a password. Although passwords restrict access to a computer, they're the weakest link in any security system. The most secure passwords are lengthy, consisting of random characters, but most people tend to choose simple, easy-to-remember passwords and use the same password for several different systems.

Also visit here:

* Facebook Phishing Attack Not Working: Facebook Hacking is More Difficult
* How hack Facebook accounts passwords using Phishing Attack - click here
* How hack Twitter accounts passwords using Phishing Attack- click here
* Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack- CLICK HERE
* STOP Facebook Hacking: Hacking Facebook Passwords Accounts is no More Easy for Hackers
* How to Hack Gmail Password: Gmail Hacking: Hack Gmail Password: Hack Gmail Account: Gmail Hack
* Hack Facebook Passwords | How to Hack Facebook Password | Hacking Facebook Passwords
* Create Fake login page: Download Fake login page for Gmail, Facebook & Twitter
* Facebook Password Hacking Software: Download Trojans & Keyloggers
* Hack Gmail: How to Hack Gmail Account Password Using PRORAT Trojan & Phishing Attack

When a computer requires a password, but you don't know what that password may be, you have several options:

* Steal a valid password
* Guess the password
* Discover the password with a brute-force attack

Stealing a password

If you can get physical access to a computer, the easiest way to steal a password is by shoulder surfing-peeking over someone's shoulder as they type in a password. If that option isn't available, poke around the person's desk. Most people find passwords hard to remember, so they often write them down and store them where they can easily find them, like next to their monitor or inside their desk drawer.

Still can't find that pesky password? Try one of these methods:

* keystroke logger
* desktop-monitoring program
* remote desktop-monitoring program
* password-recovery program

Note - All of these programs require that you have access to the victim's computer so you can install or run the programs without the user's knowledge.

Using a keystroke recorder or logger

Keystroke recorders or loggers record everything a person types, and either sends their typing to a monitoring computer or saves it to a file. The simplest keystroke loggers record anything a user types which can include incriminating email messages, credit card numbers, and passwords. When the user leaves the target computer, you can remove the keystroke logging program from their machine and retrieve the logging file that contains the password and anything else they typed. The more advanced keystroke loggers can email the log file of a user's keystrokes to you so you can monitor their activities from another location.

To avoid detection, keystroke loggers run in stealth mode, which means that they hide their presence from the user, although they can still be spotted if you know what and where to look. Unless someone suspects that someone has planted a keystroke logger on their computer, chances are good they will never look for, let alone find, a keystroke logger hidden in stealth mode.

To avoid giving away their presence at all, some keystroke loggers are available as hardware devices that plug in between the computer and the keyboard. Such hardware keystroke loggers can be spotted easily just by looking at the back of the computer, but their presence is completely invisible to any software running on that computer. Best of all, unlike their software equivalents that only work under specific operating systems, hardware keystroke loggers work with any operating system running on that computer, such as FreeBSD, Linux, Windows XP, or OS/2.

Some popular hardware keystroke loggers include KeyGhost (http://www.keyghost.com), Hardware KeyLogger (http://www.amecisco.com), and KEYKatcher (http://www.tbotech.com/key-katcher.htm). To find a software keystroke logger, visit Keylogger.org (http://www.keylogger.org), which rates the different keystroke loggers by their features and ease of use.

Spying with a desktop-monitoring program

More powerful than keystroke loggers are desktop-monitoring programs. Like a computer surveillance camera, desktop-monitoring programs secretly record the programs a person uses, how long the person uses each program, the websites viewed, and every keystroke the user types. To show you what a user might be doing, some desktop-monitoring programs can periodically capture the contents of the screen or secretly turn on a webcam to record the person sitting in front of the computer.

Many desktop-monitoring programs can store days of recordings, and some can be set to record at specifically designated times, when certain applications are run, or when a user logs on to the Internet.

To find a desktop-monitoring program, visit Computer Monitoring Software http://www.computer-monitoring.com or try these programs:

1. AppsTraka http://appstraka.hypermart.net
2. Desktop Surveillance http://www.omniquad.com
3. iSpyNOW http://www.ispynow.com
4. Net Vizor NetVizor Network Monitoring Software
5. Spector http://www.spectorsoft.com
6. SpyBuddy http://www.agent-spy.com
7. WinWhatWhere Investigator http://www.winwhatwhere.com
8. WinGuardian http://www.webroot.com

Remotely viewing another computer's desktop

Desktop-monitoring programs are useful if you have regular access to the computer you want to watch. But if you don't, you can use a remote desktop-monitoring program instead. Just install a program such as Q-Peek (http://www.qpeek.com), Spector (http://www.netbus.org), or PC Spy (http://www.softdd.com) on the computer you want to monitor. Then, anything anyone types, views, or manipulates on that computer will appear live on your computer's screen.

Using a password-recovery program

Because typing a password over and over again to access a program can be a nuisance, many programs let you store passwords directly in the program, hidden behind a string of asterisks. Because people often forget these passwords and then can't access their programs or files, password-recovery programs have been developed to retrieve these lost or forgotten passwords. You can, of course, also use these programs to retrieve other people's passwords.

There are many commercial and free versions of password-recovery programs, such as these:

1. iOpus Password Recovery XP http://www.iopus.com
2. Passware Kit http://www.lostpassword.com
3. Peek-a-boo http://www.corteksoft.com
4. Revelation http://www.snadboy.com

Besides blocking access to a program, passwords can also block access to files, like WordPerfect documents or Microsoft Excel spreadsheets.

1. AccessData http://www.accessdata.com
2. Alpine Snow http://www.alpinesnow.com
3. Crak Software http://www.crak.com
4. ElcomSoft http://www.elcomsoft.com
5. Password Crackers http://www.pwcrack.com
6. Passware http://www.lostpassword.com

Guess a password with a dictionary attack

Most people choose easy-to-remember passwords, which means the odds that someone will choose an ordinary word for a password are extremely high. To find passwords that use ordinary words, hackers have created special password-cracking programs that use dictionary files (sometimes called word lists), which contain actors' names, names of popular cartoon characters, popular rock bands, Star Trek jargon, common male and female names, technology-related words, and other common words found in most dictionaries.

The password-cracking program takes a word from the dictionary file and tries this word as a password to access a computer. If the first word isn't the right password, the password-cracking program tries another word from its dictionary list until it either finds the right password or runs out of words. If the password works, you have access to the program you want. Of course, if it runs out of words in its dictionary file, you can try another dictionary file until you find a valid password or run out of dictionary files. If a password is an ordinary word, it's only a matter of time before a dictionary attack will uncover it.

To increase the odds of uncovering a password, some password-cracking programs will not only try every word in a dictionary file, but also subtle variations of each word, such as spelling the word backwards or adding different numbers on the end. So even though a password like SNOOPY12 won't be found in an ordinary dictionary file, the password-cracking program can still uncover this password by manipulating each word in its dictionary file.

For an example of a dictionary attack tool sold commercially for people to test the security of their networks, visit SolarWinds (http://solarwinds.net). For one of the largest collections of word lists, visit the Wordlist Project (http://wordlists.securityon.net), which offers word lists in various languages, including English, Spanish, Japanese, and Russian.

Brute-force password attacks

Dictionary attacks can find ordinary words or variations of words, but sometimes a password may consist of random characters. In these cases, the only solution is to use a brute-force attack.

As the name implies, a brute-force attack is like prying a password out of a computer by smashing it with a sledgehammer. Instead of trying common words that most people use as passwords, the brute-force method simply tries every possible combination of characters in varying lengths. So, if someone's password is as obscure as NI8$FQ2, a brute-force attack will find that password (and every other password on that computer) eventually.

Brute-force attacks are especially popular when cracking Unix systems, because most Unix systems store the list of account names and passwords in the /etc/passwd file. To provide a small degree of security, Unix encrypts each person's password using an encryption algorithm (also called a hash function), usually using the Data Encryption Standard (DES).

To gain access to Unix computers, hackers simply copy the /etc/passwd file to their own computer so that they can run a dictionary or brute-force attack on that file at their convenience, without risk of being spotted. With a copy of the passwd file on their own computer, hackers can take as much time as they need until either the dictionary or brute-force attack succeeds. Once it finds just one password, the hacker can use that password to gain access to that unlucky person's account.

To find password-cracking programs that use word-list or brute-force attacks, visit these sites:

1. BlackCode http://www.blackcode.com
2. AntiOnline http://www.antionline.com
3. New Order http://neworder.box.sk

OTHER USEFUL LINK RELATED TO THIS POST:

How to hack a PC or remote system using Trojan & Backdoor

Tools & Softwares for Trojans and Backdoors

Trojans and Backdoors - 4 :Modes of Transmission

Download Free FSCRACK: GUI for John the Ripper password cracker

Top 10 Password Crackers

Password guessing attacks- Can be carried out manually or via automated tools

Web Based Password Cracking Techniques

Keystroke Loggers: KEYLOGGERS - If all other attempts to sniff out domain privileges fail, then keystroke logger is the solution

Hacking Tool: John the Ripper

Password Types- Passwords can be categorized into various types based on their composition

Automatic Password Cracking Algorithm

Manual Password Cracking Algorithm

Password Sniffing