ÇØÄ¿Áî´º½º / ÇØÄ¿´ëÇÐ

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡
¡¡

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡

°øÁö

¡¡

1. MS ¿§Áö ºê¶ó¿ìÀú¿¡¼­ÀÇ °æ°íâÀº 'À©µµ¿ì µðÆæ´õ'¸¦ ²ô½Ã¸é µË´Ï´Ù.

             'À©µµ¿ì µðÆæ´õ ²ô±â'

2. Å©·Ò ºê¶ó¿ìÀú·Î Á¢¼Ó½Ã ³ª¿À´Â ¾Ç¼ºÄÚµå °æ°íâÀº ±¸±Û Å©·ÒÀÇ ¿¡·¯, Áï ¿ÀŽ(ŽÁö ¿À·ù)À̹ǷΠ¹«½ÃÇÏ½Ã¸é µË´Ï´Ù.

3. ÀÌ »çÀÌÆ®´Â ¾ÈÀüÇÏ¸ç ±ú²ýÇÏ´Ù´Â °ÍÀ» ¾Ë·Á µå¸³´Ï´Ù.

4. ¹«°íÇÑ »çÀÌÆ®µé¿¡ ´ëÇÑ °ø·æ ±â¾÷ ºê¶ó¿ìÀúµéÀÇ ¹«Â÷º°ÀûÀÎ 'ŽÁö ¿À·ù ȾÆ÷'°¡ »ç¿ëÀÚµéÀÇ Á¤º¸ °øÀ¯ÀÇ ÀÚÀ¯¸¦ ħÇØÇÏ°í ÀÖ½À´Ï´Ù. ÀÌ¿¡ ´ëÀÀÇÏ¿© ÀÌ ±â¾÷µéÀ» »ó´ë·Î ¼Ò¼ÛÀ» ÁغñÇÏ°í ÀÖ½À´Ï´Ù.

¡¡





  ÇØÄ¿¸ô  
No, 3923
±¸ºÐ: À¯Æ¿
Á¾·ù: Á¾ÇÕÅø
ÆÄÀÏÇüÅÂ: .rar
¶óÀ̼¾½º: »ó¿ë
Áö¿øOS: ¸ðµçÀ©µµ
Å©·¢¿©ºÎ: Yes
2020/7/1(¼ö)
Á¶È¸: 1251
hackersnews.co.kr(Load:103)
2020³âµµ Á¾ÇÕ ¼±¹° ¼¼Æ® - ¼¾Æ¼³Ú Å°·Î°Å ¿Ü  


¾ÐÃà ºñ¹ø : 12345

Sentinel Keylogger 100+ Features

VT Scan: https://www.virustotal.com/gui/file/9f6440d4f6430365778e48cf9998cfc765c143168b02d0b6a715c660c66595a6/detection

---- BASIC ----

* Fake Error Message - Stub will display a fake error message when executed. Timeout refers to the time how long the fake error message will be displayed until it close itself, set it to 0 if it never should automatically close it self
* Add to Startup - Adds the keylogger to startup; so it auto executes when Windows is started up again
* Hide Startup - Hide startup entry
* Hide Folder - Hides the keyloggers folder where the logs are saved in
* Melt File - The stub will delete itself after keylogger got successfully installed
* Get System Information - Retrieve system information such as IP Address, Installed AV, Hardware/Software info, IpConfig etc
* Clear Browser Data - clears all data stored for the browser - works with all browsers - clears cookies, cache, session data, history, etc
* Delay Execution - Delays execution by specified timeout in seconds
* Stealers - Recovers Passwords and sends it along with keylogs; 20+ Module recovery
* Steam Recovery - Recovers all required files (vdf/config/SSFN) required to bypass SteamGuard
* Steam Reset - Resets Steam saved passwords - requiring the user to type it again to login
* Mutex - Instance controller; only allows one process of the keylogger running on a PC
* UAC Bypass - UAC Bypass exploit that allows you to get admin rights without the need of confirming via UAC. Only works on Win7 or lower versions
* AntiVirus Killer - Advanced mechanism of killing AntiVirus programs, over 180+ total killers.
* Bot Killer - Cleans startup of the victim
* Install to - Custom directory to select from to install the keylogger stub to. You can change the name of the folder, but you can also enter a custom path, like "customPath\to\customFolder"

---- PASSWORD RECOVERY ----

List of all programs which will be recovered:

Chrome
Firefox
Internet Explorer
Opera
Thunderbird
Outlook
Skype
Jitsi
Pidgin
Wifi
Windows Hashes
LSA secrets
Filezilla
CoreFTP
Cyberduck
FTPNavigator
PuttyCM
SQLdeveloper
Tortoise
And some more

If you receive an empty password.txt, you can try to use the secondary recovery tool, this will recover less, but will probably work better and might even make your file less detected
(check Password recovery and secondary in that case)

Optional you can choose to add:

* steam recovery - this will attach all needed files to recover a steam account and even bypass steam guard. For the people who don't know "steam" please just google.
* steam reset - this will close steam if it is open and delete the last login information, so the user have to login again with username and password


---- ADVANCED ----

* Screenshot Logger - Takes timely screenshots of the victim's PC. Timeout can be changed on first tabpage. They arrive in a separate email along with snapshots.
* Webcam Logger - Takes timely snapshots from the webcam of the victim's PC. Webcam lights will flicker for the time of taking the picture for 1~ second (belongs to the webcam). So use with care! Snapshots arrives in a mail along with screenshots. Timeout is the same as screenshot delivery timeinterval.
* Clipboard Stealer - Records all data copied on the clipboard. It will be colored blue in the logs with [COPIED: text]
* IP Logger - Records the current IP address at the beginning of every logfile.
* Hide Task in Task Manager - Hides your process in the task manager, works only with Win7 or below
* Unkillable Process - Advanced function that allows the process to be immortal. Cannot be killed even with admin rights. DO NOT ENABLE THIS IF YOU ARE TESTING YOUR STUB. Even System Cure cannot remove it.
* USB Spreader - Uses the shortcuts/.lnk method to infect any USB drive plugged in. Av might detect if an USB got infected.
* Automatic Update:
Custom File Path must be specified. The file path must have two files: version.txt having a version number and update.exe being the stub. Case sensitive names!
The stub has a specific version number, that is set by default to "1". In the version.txt, update it to "2" for the first update, then "3' for the second update and so on.
Make sure the file path is accessible.
The keylogger will check the version.txt on your server every 10 min, if it has changed. If so, it will download and execute the update.exe.

NOTE: For HTTP webservers with public access (for webclient downloading)
* Anti Debugging - Prevents execution of the stub on VMs, recommened if you dont want to get traced back disable if you want to test on VM.
* Process Name - Custom process name of the keylogger process that will appear on Task Manager (if not hidden)
* Downloader - Downloads and silently/visibly executes the files on the list. Only works with direct links! Directlink means, the link ends with your file extension.


---- METHOD OF KEYLOGGING ----

* Keyboard Hook is recommened, this methode will get every key in the right order for sure, no matter how fast you type.

* IsPressed is not recommended if you want to monitor people who type faster than 40 Words Per Minute.
Use IsPressed in case you are facing an error using keyhook, but IsPressed might misses some keys if the user types very fast, so keyhook is recommended

The detection rate of the stub can change if you change the method of keylogging.

---- LOGS -----

The logfile you will get is a colored and well structured html file, you can choose if parts of it should get highlighted, with a bigger font
and a special color. The keylogger will search for the keywords in the window title, if found the part will get highlighted.
Selection of Colors - DarkOrange, DarkSlateGrey, Blue, Red
You can add your own Keywords to the lists and edit them. (currently not working)

---- DISABLER ----

* All functions on this page require admin rights
* Process Killer works on an advanced freeze & kill mechanism
* Disable UAC is recommended if you are dealing with functions with the "shield" icon - those that require admin - so that the UAC doesn't interfere in the future
* Rest of the disablers are optional
* This tab page contains features that may cause runtime detections, so use with care.

---- WEBSITE ----

* Website Visitor - Visits all websites in the list in hidden/visible mode
* Website Blocker - Edits the Windows HOSTS File & blocks all the websites listed. Requires admin and may trigger AV detections. Add the site twice like "www.avg.com" and "avg.com" to get sure, that it will be completely blocked!

---- TOOLS ----

* Assembly Changer - Changes the assembly of the stub compiled to a custom & specified one.
* File Binder - Binds a file along with the .exe - that will be silently/visibly executed on opening the stub if specified. Works with all kinds of files like images and executables.
* Extension Spoofer - Spoofs the extension to any custom specified one and also converts the stub.exe to a screensaver file (.scr) .
* File Pumper - Pumps the file with required KBs of data
* Icon Changer - Choose an icon for the stub.
* System Cure -  Requires admin rights and will cure your PC from Autolog and all settings done by Autolog will get reversed, be sure to always cure your system, before testing another stub.

---- Crypter that you can use with AutoLOG ----

The AutoLOG stub does not use EOF, you can try to use any crypter you want to, as long as it has native support, but sometimes some crypters destroys the stub, so always test the stub after you crypt it. We are not reliable if you got problems with a crypter and also dont ask the Autolog support when you get problems on crypters, ask their support instead.  
                   
¹øÈ£±¸ºÐÁ¦ ¸ñÀ帣
3926 Á¤º¸    ¾Ç¼ºÄÚµå(Malware)¸¦ Á¦°ÅÇÏ´Â µ¥ »ç¿ëµÇ°í ÀÖ´Â µµ±¸µé ¾Ç¼ºÄÚµå 
3925 È°¿ëÆÁ    À©µµ UAC ¿ìȸ °ø°ÝÇϱâ Bypass 
3924 À¯Æ¿    IDA Pro 7.2 µð¹ö°Å 
3923 À¯Æ¿    2020³âµµ Á¾ÇÕ ¼±¹° ¼¼Æ® - ¼¾Æ¼³Ú Å°·Î°Å ¿Ü Á¾ÇÕÅø 
3922 À¯Æ¿    NSA°¡ °ø°³ÇÑ ¸®¹ö½Ì µµ±¸ - ±âµå¶ó ¸®¹ö½º¿£Áö´Ï¾î¸µ 
3921 Á¤º¸    xss ³¡ÆÇ¿Õ »çÀÌÆ® XSS 
3920 À¯Æ¿    Àü ¼¼°è ¸ðµç Å©·¡Å· Åø ¸ðÀ½ - 238 ¸Þ°¡ Å©·¡Ä¿ 
3919 È°¿ëÆÁ    GDB Ä÷¯Ç®ÇÏ°Ô ²Ù¹Ì±â! µð¹ö°Å 
3918 À¯Æ¿    ÃÊ°­·Â ¸ÅÅ©·Î ¸ÅÅ©·Î 
3917 È°¿ëÆÁ    Å°º¸µå ÀÔ·ÂÀ» ÈÉÃ帴 ¾Ç¼ºÄÚµå, Å°·Î°ÅÀÇ ¿ø¸®¿Í Á¦ÀÛ Å°·Î°Å 
3916 À¯Æ¿    SQL ´ýÆÛ 9.9.6 SQLi 

 
óÀ½ ÀÌÀü ´ÙÀ½       ¸ñ·Ï