Post: Basic Keylogging and Trojaning
06-19-2009, 03:02 AM #1
(adsbygoogle = window.adsbygoogle || []).push({}); Note; I, BleedingPainter, am not responsible for any action followed by this post. This post is for educational purposes only and should not be acted upon in any way. When using these methods for your benefit, you forfeit any affiliation with BleedingPainter and NextGenUpdate.com.



This is my second thread posted on NextGen and I would like to thank all who +rep on my last thread! I hope this will be even better than my last Smile Thanks!

When playing a game when I was much younger called HabboHotel, I never wanted to pay money for you know.. money and items that never really excisted because they were pixels. So I soon learned to gain access to people's computers, making their pixels, my pixels. Soon I did this to almost every game I played, making it just that much more fun! RuneScape, SecondLife, blah blah blah. But I will show you how to easily gain access to whoever you'd like, in a very easy manner.

A Key Log records all typed keystrokes, visited web sites, system logon passwords, clipboard usage, passwords behind asterisks and much more in total stealth
Easiest Keylogger to use: Soft Central Keylog, the earlier version you can find the better.
Setting up the keylogger using SC;

1.set up the ardamax keylogger, and right
click the little icon in the taks bar.if its not
there, push ctrl+shift+alt+H.

2.once you have right
clicked it, click "remote installation".

3.configure it
like the following:
click next untill you get to security.
push "enable" and set a password that you will
remember.click next.
were it says, check for updates, make sure this
is unchecked.click next untill it says control.
click "send logs every"and configure it to your
liking.this is so it sends the logs to your email.

4.put in your email address, and click "test".if it
doesnt work, try a few more times.if it doesnt
work after that, you may have to use an SMPT
server.use google.the ideal email is gmail.

5.just click next untill your finished,
theres nothing needed to be done.

Send it to people you do not like, advertise it on your website, bind it to another program. The sky is the limitSmile


Basic Trojaning using ProRat

Part 1: Making the server

yes i know this is not the best place to start, but i seems logical that you do this first, so, open Prorat, on the left side you see buttons, go ahead and experiment, they dont do much right now.

now, click "Create" and you will be faced with a few options. click "Create ProRat server" for now. this options will make the file (server) that has to be run on the other person (vitims) 's computer, so that you can gain access to it.

now the first thing you see here is notifcations, this is important, you need prorat to send you back an IP address to which you can connect to, so make sure at elast one of them works, select the one you wish to use, and TEST IT, i use ICQ, i know that works, and i could not get email to work for me, but its ok, i manage with ICQ

when u test, ill use ICQ as an example, u get a message. this will be the exact message that you will see, but showing your ip address, this is what somebody else might see if they infected you.

move on to general settings, and select what you like, i keep the port the same, but this is up to you. an error message is clever, without it, the program looks like it does nothing, because other then that, nothing opens up. i recoment killing AV-FW (antivirus / firewall) because then you are undetectable. also, disable windows firewall. the rest is up to you

the next few are self explanetory, binding with file is not required, but is a good options when mass-infection is required. server extenstions - self explanetory, as well as icon...... dont pick something too obvious, be a little stealthy :p

now create the server

Part 2: Connection

assuming that you gave the program to somebody, and then ran it, you got your notification with their IP address, and now you want to connect to them, here is what you do:

in the main program, stick in their ip address into the IP box, and the port that you chose for the server in the port box. if all went right, you should hear a satisfying ping, and a message box asking for your password, this is to make sure that you are the only person that can access an infected computer.

thats it, you are connected

Thanks and much contribution from and to rebelflyy and ghostdogethicalhacking


Hope everyone can use this!

The following 8 users say thank you to DonVodka for this useful post:

Abzorbr, Elder Legendah, ƒrizz, LordOfSpoon™, Mighty Jebuz, mrcustard, Shadow_Killer
06-19-2009, 03:07 AM #2
Shadow_Killer
UnderCover Adrninistrator
Originally posted by BleedingPainter View Post
Note; I, BleedingPainter, am not responsible for any action followed by this post. This post is for educational purposes only and should not be acted upon in any way. When using these methods for your benefit, you forfeit any affiliation with BleedingPainter and NextGenUpdate.com.



This is my second thread posted on NextGen and I would like to thank all who +rep on my last thread! I hope this will be even better than my last Smile Thanks!

When playing a game when I was much younger called HabboHotel, I never wanted to pay money for you know.. money and items that never really excisted because they were pixels. So I soon learned to gain access to people's computers, making their pixels, my pixels. Soon I did this to almost every game I played, making it just that much more fun! RuneScape, SecondLife, blah blah blah. But I will show you how to easily gain access to whoever you'd like, in a very easy manner.

A Key Log records all typed keystrokes, visited web sites, system logon passwords, clipboard usage, passwords behind asterisks and much more in total stealth
Easiest Keylogger to use: Soft Central Keylog, the earlier version you can find the better.
Setting up the keylogger using SC;

1.set up the ardamax keylogger, and right
click the little icon in the taks bar.if its not
there, push ctrl+shift+alt+H.

2.once you have right
clicked it, click "remote installation".

3.configure it
like the following:
click next untill you get to security.
push "enable" and set a password that you will
remember.click next.
were it says, check for updates, make sure this
is unchecked.click next untill it says control.
click "send logs every"and configure it to your
liking.this is so it sends the logs to your email.

4.put in your email address, and click "test".if it
doesnt work, try a few more times.if it doesnt
work after that, you may have to use an SMPT
server.use google.the ideal email is gmail.

5.just click next untill your finished,
theres nothing needed to be done.

Send it to people you do not like, advertise it on your website, bind it to another program. The sky is the limitSmile


Basic Trojaning using ProRat

Part 1: Making the server

yes i know this is not the best place to start, but i seems logical that you do this first, so, open Prorat, on the left side you see buttons, go ahead and experiment, they dont do much right now.

now, click "Create" and you will be faced with a few options. click "Create ProRat server" for now. this options will make the file (server) that has to be run on the other person (vitims) 's computer, so that you can gain access to it.

now the first thing you see here is notifcations, this is important, you need prorat to send you back an IP address to which you can connect to, so make sure at elast one of them works, select the one you wish to use, and TEST IT, i use ICQ, i know that works, and i could not get email to work for me, but its ok, i manage with ICQ

when u test, ill use ICQ as an example, u get a message. this will be the exact message that you will see, but showing your ip address, this is what somebody else might see if they infected you.

move on to general settings, and select what you like, i keep the port the same, but this is up to you. an error message is clever, without it, the program looks like it does nothing, because other then that, nothing opens up. i recoment killing AV-FW (antivirus / firewall) because then you are undetectable. also, disable windows firewall. the rest is up to you

the next few are self explanetory, binding with file is not required, but is a good options when mass-infection is required. server extenstions - self explanetory, as well as icon...... dont pick something too obvious, be a little stealthy :p

now create the server

Part 2: Connection

assuming that you gave the program to somebody, and then ran it, you got your notification with their IP address, and now you want to connect to them, here is what you do:

in the main program, stick in their ip address into the IP box, and the port that you chose for the server in the port box. if all went right, you should hear a satisfying ping, and a message box asking for your password, this is to make sure that you are the only person that can access an infected computer.

thats it, you are connected

Thanks and much contribution from and to rebelflyy and ghostdogethicalhacking


Hope everyone can use this!


Great thread! Keep up the good work. I thanked your Post.
06-19-2009, 03:07 AM #3
Elder Legendah
┌∩┐(◕_◕Winky Winky┌∩┐
nice tutorial thanks
06-19-2009, 03:10 AM #4
"Hacking is like sex. You get in, you get out, and hope that you didn't leave something that can be traced back to you." LOL and thank you very much for the hacking tips.
06-19-2009, 03:12 AM #5
Originally posted by xDeCePtIoNx View Post
"Hacking is like sex. You get in, you get out, and hope that you didn't leave something that can be traced back to you." LOL and thank you very much for the hacking tips.


Haha I love it.

Thank you guys very much! Smile I appreciate everything and I hope I can write many new tutorials for you all.
06-19-2009, 10:39 PM #6
Thanks Bro.....
06-22-2009, 06:17 AM #7
If anyone has any questions or tips where to find these programs, just holler and I'll try to help ya find a keygen or something of the sorts Smile until then, marry hacking.
06-22-2009, 06:38 AM #8
Shadow_Killer
UnderCover Adrninistrator
Originally posted by xDeCePtIoNx View Post
"Hacking is like sex. You get in, you get out, and hope that you didn't leave something that can be traced back to you." LOL and thank you very much for the hacking tips.


Do you have a Problem with my Quote in My Sig?.lol
06-22-2009, 03:01 PM #9
CorruptedBullet
Do a barrel roll!
Post some links for download
06-22-2009, 04:04 PM #10
or you could just google key logger and it will bring up hundreds

Copyright © 2024, NextGenUpdate.
All Rights Reserved.

Gray NextGenUpdate Logo