Whaling

Reputation
0
Alright well I'm having a sort of fight with a guy, nerd fight basically. I got on his gmail and spread a couple emails of him and his girlfriend, so he's planning on keylogging me.
I've got Bintext already downloaded, but what if the keyloggers crypted there or something?

And yes, I want him to keylog me just so I can have the pleasure of whaling him and laughing in his face.

Any tips really? It's been a long time and I have no clue what keylogger he's gonna use and I need to be prepared if it's randomized.

Thanks! :3
 
If it is crypted , you need to figure out what algorithm he used. Besides , that probably didnt help at all . :)
 
Reptarr said:
If it is crypted , you need to figure out what algorithm he used. Besides , that probably didnt help at all . :)

Well he wouldn't have crypted it hes an idiot. He'll probably just take some random keylogger off the internet and try and get me. Is there an easyish way to find out what kind of crypter a coder used?
 
Well depends.
If it's a .NET codedom keylogger, it might be kinda easy to get his username/password, you can simply look at the source. If it's a .NET keylogger with a .exe stub or something that uses copying the stub and putting text to it, if it's not encrypted, you can get the username/password with bintext. But if it is encrypted, you first might want to know with what it was encrypted and then decrypt.
Most common text encryptions in keyloggers are RC4, XOR, and TripleDES (edit: free ones).
 
Alrighty. I honestly don't know what he's gonna do, he has a slightly techy guy helping him. I just heard it from a friend that they're going to keylog me. Hopefully no encryption, i'll just open it up and troll all over them ;).
 
Dude you're best off using .NET reflector over bintext to whale him, it much easier to read.
 
I wrote a whaling tool for Project Neptune in under 5 minutes.
 
Back
Top