Social Icons

twitterfacebookgoogle pluslinkedinemail

Friday 23 August 2013

How to Back trace Key loggers..?

Now all key loggers and Rats are sending data to the hacker in regular intervals (usually every 5 to 10 minutes) by using one of the two methods below:


1. Using the Emails: where hacker configures his email ID and password while creating the server. Key logger records the key strokes in a temp file and sends it to the hacker in form of emails. But this has a limit as most free email servers like Gmail or Yahoo or Hotmail has limit of 500 composed and received mails. So most hackers use the second method.




2. FTP server: While creating the key logger server, hackers configure their FTP server, where they receive the logs of key strokes in the form of text file(usally labeled on the basis of current system time stamp). Hackers key logger server uploads the files to FTP server after every few minutes interval.

No comments :

Post a Comment

 

Free Advertisement

Free Advertisement

Free Advertisement

Free Advertisement