How to Remotely Install a Keylogger onto Your Girlfriend's Computer


Many of you sent me an email asking if it was possible to install a keylogger on the victim's computer using Metasploit. The answer is a resounding “YES”!

So, with this popular application, in this guide I will show you how to install a keylogger on your girlfriend's, boyfriend's, wife's or husband's computer.

Don't Miss: How to Hack any Facebook Account with Wireshark 2020 New Method

For those who are wondering what a keylogger is, the simple answer is a piece of software or Hardware that takes all the keystrokes and saves them for you to retrieve, the attacker. These types of devices have long been used by hackers to capture logins, passwords, social security numbers, etc. Here we will use it to capture the buttons of a cheating girlfriend.

Fire Up Metasploit let's get started.

As in my last article on disabling antivirus software, I think you have successfully installed a powerful Metasploit listener / rootkit on the targeted system.

Step 1: Migrate the Meterpreter

Before we can start our keylogger, we need to move the Meterpreter to the program or process we want to enter to press the keys from. Let's take a look at what processes work in a victim's system by typing:

meterpreter> ps

Note in the screenshot above that we have a list of all the processes that apply to the victim's system. We can see about 1/3 of the way below the process list with Process ID (PID) 912, the Notepad app is open and active.

Let’s migrate on to that process and capture any key presses inserted there. Type:

meterpreter> migrate 912

You can see from the screen that Meterpreter responds to our successful migration,

Step 2: Start Keylogger

Now that we've moved the Meterpreter to Notepad, we can embed a keylogger.

Don't Miss: Install Microsoft Powershell on Linux 2020

Metasploit Meterpreter has a built-in software keylogger called keyscan. To start it in the victim computer, just type:

meterpreter> keyscan_start

With this command, Meterpreter will now start accessing all keystrokes installed in the Notepad app.

Step 3: Write a Short Note on the Victim Program

Now let’s move on to our victim program and write a short note to make sure it works.

As you can see in the picture above, Cheatah wrote a short letter to Study, asking her to visit him when her boyfriend was gone. All of these button clicks are taken by our keylogger who gives us evidence of his cheating heart (or other organ).

Don't Miss: How to Create own Virtual Hacking Lab in VMWare 2020

Step 4: Recover the Keystrokes

Now, let’s get back to our plan with Meterpreter running on Metasploit. We can now get rid of all the buttons installed on Cheatah's computer. Just type:

meterpreter> keyscan_dump

As you can see, all the key keys are inserted including the tabs and the end of the line characters. Now you have proof in Cheatah!

In my next post, we will continue to look at some of the more powerful features of the Metasploit's Meterpreter.

Post a Comment