How to: Use Ardamax Keylogger to Hack Emails, Facebook and Twitter
1) From windows task bar at extreme right side open ardamax which will be running like this:
2) After this press next, as a dialog box appears and select the options as I have done below and then press next.
3) After this tick all the given options, and press next again.
4) After this press Enable and then give a password for better security of the remote keylogger. Press next also See screen shot below:
5) Now, untick update option and hit next.
6) Now after pressing next in last step, choose the options as I did in scree shot below, you can also enable self destruct of keylogger at specific date, after that date the keylogger will be no more in the victim system to send you logs, how ever to keep that forever in that pc, till that victim’s computer is not formatted disable as I did and hit next as below I did:
8) You will need a free ftp account here, You can make one at t35.com and they will tell you your ftp information in the end after you have created your account, following information will be given:
- Ftp Host:- ftp.t35.com
- Username:- yourusername.t35.com
- Password:- Which you have selected for signup
- Port:- 21
So, put this information in below dialog box:
You can test too, and a test file will be uploaded to your remote ftp server. Press next!
9) Enable all the options given and tick them.Like I did and press next:
10) After that setup the screen shot quality in next step, I leave this one you that how much quality screen shot of victim screen you need. Press next again.
11) Now you have to give ardamax remote keylogger utility the path where you want that remote keylogger exe should be created in your computer, so that you may send it later to victim. I have given this path:
- C:\Program Files\POL\Install.exe and I have chosen installation package icon to fool the victim so that he may think it a software. Then hit next and hit finish and then go to :- C:\Program Files\POL\Install.exe here you will see that Install.exe is created now just copy it and send it to victim by email or any other mean, I’ll discuss all such means in my next post. See screen shot below:
12) So you are done just spread it and you will start receiving logs inyourusername.t35.com point your browser here to watch all logs or else use Filezilla to download all logs