Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 382 Vote(s) - 3.56 Average
  • 1
  • 2
  • 3
  • 4
  • 5
how we Know if any Keylogger run in our Computer

#1
i heard about some way with "run" or "CMD" that we can know if any key logger run in our computer.., can u tell me if u know that ???
or any other methods ??? :innocent:
Reply

#2
I think what you are looking for is:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Description:
Quote:Displays the executable involved in creating each connection or
listening port. In some cases well-known executables host
multiple independent components, and in these cases the
sequence of components involved in creating the connection
or listening port is displayed. In this case the executable
name is in [] at the bottom, on top is the component it called,
and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless you have sufficient
permissions.

You will get an output like this:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

Reply

#3
Quote:(06-30-2011, 07:51 AM)Coder-san Wrote:

[To see links please register here]

I think what you are looking for is:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Description:
Quote:Displays the executable involved in creating each connection or
listening port. In some cases well-known executables host
multiple independent components, and in these cases the
sequence of components involved in creating the connection
or listening port is displayed. In this case the executable
name is in [] at the bottom, on top is the component it called,
and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless you have sufficient
permissions.

You will get an output like this:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

thanks Admin :smile: think this is i searched about ,but if you can you explain me more ., how to check it ??
Edit - netstat -b is not workin for me why is that ?? :o but netstat -a is working ???
Reply

#4
I'm not sure what can be the problem. Here is the full contents of netstat:

Quote:Microsoft Windows [Version 6.1.7601]
Copyright © 2009 Microsoft Corporation. All rights reserved.

E:\Users\User>netstat /?

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-t] [interval]

-a Displays all connections and listening ports.
-b Displays the executable involved in creating each connection or
listening port. In some cases well-known executables host
multiple independent components, and in these cases the
sequence of components involved in creating the connection
or listening port is displayed. In this case the executable
name is in [] at the bottom, on top is the component it called,
and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless you have sufficient
permissions.
-e Displays Ethernet statistics. This may be combined with the -s
option.
-f Displays Fully Qualified Domain Names (FQDN) for foreign
addresses.
-n Displays addresses and port numbers in numerical form.
-o Displays the owning process ID associated with each connection.
-p proto Shows connections for the protocol specified by proto; proto
may be any of: TCP, UDP, TCPv6, or UDPv6. If used with the -s
option to display per-protocol statistics, proto may be any of:
IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are
shown for IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6;
the -p option may be used to specify a subset of the default.
-t Displays the current connection offload state.
interval Redisplays selected statistics, pausing interval seconds
between each display. Press CTRL+C to stop redisplaying
statistics. If omitted, netstat will print the current
configuration information once.


E:\Users\User>
Reply

#5
hmm.., i'm using Dongle right now, maybe problem is that.., :smile: :smile: :smile: thanks Coder-san
Reply

#6
HI
IS ANY ONE KNOW THAT HOW TO SET KEEP ASKING PASSWORD IN OUTLOOK EXPRESS BY BATCH FILE.........
Reply

#7
Quote:(06-30-2011, 08:01 AM)Shining White Holmse Wrote:

[To see links please register here]

Quote: (06-30-2011, 07:51 AM)Coder-san Wrote:

[To see links please register here]

I think what you are looking for is:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.


Description:
Quote:Displays the executable involved in creating each connection or
listening port. In some cases well-known executables host
multiple independent components, and in these cases the
sequence of components involved in creating the connection
or listening port is displayed. In this case the executable
name is in [] at the bottom, on top is the component it called,
and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless you have sufficient
permissions.

You will get an output like this:

Hidden Content
You must

[To see links please register here]

or

[To see links please register here]

to view this content.

thanks Admin :smile: think this is i searched about ,but if you can you explain me more ., how to check it ??
Edit - netstat -b is not workin for me why is that ?? :o but netstat -a is working ???

You probably forgot to run cmd.exe as administrator.

[To see links please register here]

Reply

#8
Yeah man....... <3 Thanks.. » ¥ «
Reply

#9
The easiest way is to install antivirus in your compter, most of the antivirus will pick up keylogger software, however, if the

[To see links please register here]

is added to the ignore list, it's hard to find out it.
Reply

#10
Try MBAM or SpyBot Destroy.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through