An Introduction To Keylogger, RATS And Malware.pdf

(2241 KB) Pobierz
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
An Introduction To Keyloggers, RATS And Malware
By: Rafay Baloch
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com
Page 1
842487008.016.png 842487008.017.png
Copyright Notice
This book may not be reproduced or copied without the permission of
the author. You are allowed you give it away and distribute it as long
as you don’t make any changes.
Here is the list of the things which you cannot do with this book:
[NO] Can Be Edited Completely
[NO] Can Claim full ownership
[Yes] Can be added to paid membership sites
[Yes] Can be packaged with other products
[NO] Can be sold
[NO] Can be bundled with other products
[NO] Can be broken into multiple chapters
[Yes] Can be given away
[NO] Can sell Resale Rights
[NO] Can sell Master Resale Rights
[NO] Can sell Private Label Rights
[NO] Can be offered through auction sites
[NO] Can sell product as is without changing a thing
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com
Page 2
842487008.018.png
Legal Disclaimer
The information provided in this book should be used for educational
purposed only. The author holds no responsibility for any misuse of
the information provided.
This is not a book which promotes or encourages or exits hackers. But
my purpose is to make people aware of security online. I believe that
unless you know how to hack (Ethically, you cannot defend yourself
from malicious hack attacks). Know Hacking but no Hacking .
Warning
Invading some one’s privacy is a crime and can experience several
penalties if caught.
You implement this information at your own risk!
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com
Page 3
842487008.019.png
Resource List
Throughout this e-book the following products are mentioned or
discussed
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com
Page 4
842487008.001.png 842487008.002.png 842487008.003.png 842487008.004.png 842487008.005.png 842487008.006.png 842487008.007.png 842487008.008.png 842487008.009.png 842487008.010.png 842487008.011.png 842487008.012.png 842487008.013.png 842487008.014.png
Table of Content
Copyright and Disclaimer……………………………………………….3
Resource list …………………….………………………………………….4
What’s This Book About? …………………….………………………….. 6
Who is Rafay Baloch?.......................................................................7
Malware and its Types...................................................................... 8
Keylogger…………………………………………………………………..9
Hardware Keylogger …………………………………………………………...11
Software Keylogger………………………………………………………….. 15
Local Keylogger……………………………………………………………….15
Remote Keylogger…………………………………………………………….24
Keylogger for Mac……………………………………………………………..32
Keylogger for linux……………………………………………………………35
Binders…………………………………………………………………….36
How does antivirus work?...............................................................41
Crypters…………………………………………………………………...42
Icon Changing……………………………………………………………44
Hexing……………………………………………………………………..46
Icon Changing…………………………………………………………...44
Stealers……………………………………………………………………48
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com
Page 5
842487008.015.png
Zgłoś jeśli naruszono regulamin