Você está na página 1de 4

Blazingtools Perfect Keylogger Stealth Guide

Installation
During the installation of Bpk it is important to choose a good keyword like upgrade centre. Upgrade centre will look like a legal program that needs internet acces in case of a firewall alert. It will fool many people. Make a map with the same name as your chosen keyword and install Bpk to that map. Furthermore you should choose Regular Installation and uncheck the option Create folder with shortcuts in the program menu

Options

General check the following items: - Run on Windows startup. - Dont show the program icon at startup. - Choose a hotkey combination: Choose your own combination!!! (example: Ctrl + Windows Key + Alt + E + R). - Hide the program from Ctrl + Alt + Delete. Do not check the option Make the program invisible in the windows startup list!!! Because after an incorrect shutdown Bpk wont load!!! All the other items in the general tab should be left unchecked.

Logging check the following items: - Set a password. Be sure the choose a strong password like a 14 digit one. Its a wise idea if your password is a non existing word and contains capitals and symbols like _ = % @ etc. - Monitor only online activity. Most of us are only interested in online activity. Checking this option will increase safety. - Enable chatlogging (if needed). - Use progressive method of keystroke interception. Most of the time this not needed but it wont do any harm if you leave it checked. You may check all the other items in the logging tab, but most of them are not needed. Before you make a Remote Installation Package make sure you press the Clear Log button.

Screenshots: Do not check any of these items. Screenshots are nice but not needed. They will decrease safety when combined with FTP

uploading and will also dramatically increase the logsize! A big logsize is not so nice because many webhosting service companies have set a monthly bandwith limit.

Email: Do not use email!!! This will dramatically decrease Bpks stealthiness due to firewall and antivirus alerts. For instance Norton will give a popupmessage when scanning outgoing email. Use FTP instead. FTP: check the following items: - Try to upload logs by FTP every 30 minutes (you can choose another time interval here if you want). - Do not check Visual log. - Log file format: choose encrypted - Upload only when logsize is more then __ Kb. 30 should be a nice value when Screenshots are disabled. It is always nice if you dont have to many upload maps in your FTP account. - Stealth uploading using Internet Explorer. - Clear logs after successful uploading. FTP server: Have a look in the original Bpk Help file for what to fill in these forms. Be sure to set a username that nobody knows. Bravepages.com is a good choise for a FTP account if you want to upload nasty stuff ;) Other companies may not tolerate Bpk uploads, so be carefull! 0catch.com is a good choise as well. If you are registering for an account, be sure that you dont use your real personal information like adress, phone number etc. This is to avoid any possibility to trace you back. Be sure to set a Remote directory that looks innocent like /Favourites and also check Use passive mode in the FTP server options menu.
Alerts: Because we use FTP instead of email in this guide, you cant use

the Alert feature.

Targets: choose enable logging in the following applications only. The less applications are chosen here the more stealth Bpk will be. How to set the applications will speak for itself, but use by application and by window title together (as a backup). Notification: Do not use this!!!

Now press the Hide program icon button and make sure that you wont be asked again to hide it.

Remote installation
The following items should be chosen: - install new or update existing keylogger on the remote computer. - DO NOT CHECK THE OPTION NOTIFY ME WHEN THE INSTALLATION PACKAGE WILL BE LAUNCHED!!! In many cases this will raise a firewall alert on your victims computer when he opened the package. This will cause suspicion and we dont want that! - Close antispyware programs, antivirusses and firewalls on package start. - Specify the program to combine it with the keylogger. Nice programs are funny exe files. Have a look at http://www.pms.no/fun/ for examples. But do not use this file!!! Make your own VBS file. This is simple: open Notepad and copy and past the following to it: msgbox "An unrecoverable application error!", vbOKOnly, "Error!" Ok, now save it and name the file after the funny file youve just chosen from the website. Now you have a file that will generate an unrecoverable application error! message when your victim opens the package. This will (hopefully) prevent further spreading of the Remote Installation Package. - Install to the following folder on the remote computer. Leave this as it is by default. Dont put anything in here. - Download and run the file from the following url is not needed and not recommended (in case the url is down).

Resource Hacker
Always use Resource Hacker to change the default Icon and make Bpk more stealth.
http://www.users.on.net/johnson/resourcehacker/

Now open ResHacker.exe and open the Remote Installation Package youve just made and go to the Action tab. Then choose Replace Icon and replace it with the same Icon as the funny file youve just downloaded from http://www.pms.no/fun/ After that click Save and thats it!!!

Last but not least


Dont use hotmail to send your Remote Installation Package because its built in Mcafee virusscanner will detect Bpk. Use a chatprogram like MSN to send it.

And simple lying will help a lot. Say that it is a funny file and that youve just received that file from a friend ;)

Você também pode gostar