Step 1: We are downloading HatKey through Github.
Step 2: We're going through the directory to the Hatkey folder.
Step 3: By command chmod + x, we have defined ourselves the execute authority on HatKey’s python file.
Step 4: We are running the HatKey python file using the python command.
Step 5: HatKey software has worked and we have parameters that we can use.
Step 6: We have displayed the values requested by the “show” command. He wants our host IP address.
Step 7: We have identified our IP address using the “set host IP address” command.
Step 8: We have a share with the “run” command.
Step 9: We will copy the payload generated and paste it into the notebook. We will then save the file with the extension “.bat”.
Step 10: We will allow the target device to run this file with the “.bat” extension. Of course, I'm gonna run this file on the virtual windows machine that I installed. And when I run it, the image that we're looking at will be like this. So the connection is established.
Step 11: To read information about the keys entered from the keyboard on the victim's device, we will go to the Output file directory inside the Hatkey folder.
Step 12: With the “ls” command, we can see which IP addresses are logged in. The one we run on our Windows machine is the “IPAdresi.senbe.txt” file. “with tail-f IPAdresi.senbe.txt”, we will be able to listen to keyboard information on the victim device momentarily.
Step 13: I logged into Internet Explorer from the victim's device. As the first frame of the screenshot shows, we received information about which site was logged in. In square 2, I wrote "keylogger successful" on the scanner and looked for it. His knowledge came to the place we were listening.
Step 14: If we want to read this information again later, we can open the txt files under the Hatkey/Output folder and read it from within.
Good Lessons...
Kod:
git clone https://github.com/Naayouu/Hatkey
Step 2: We're going through the directory to the Hatkey folder.
![2-12.png](https://bariskoparmal.files.wordpress.com/2019/10/2-12.png?w=460)
Step 3: By command chmod + x, we have defined ourselves the execute authority on HatKey’s python file.
Kod:
chmod +x HatKey.py
![3-14.png](https://bariskoparmal.files.wordpress.com/2019/10/3-14.png?w=494)
Step 4: We are running the HatKey python file using the python command.
Kod:
python HatKey.py
![4-8.png](https://bariskoparmal.files.wordpress.com/2019/10/4-8.png?w=481)
Step 5: HatKey software has worked and we have parameters that we can use.
![5-6.png](https://bariskoparmal.files.wordpress.com/2019/10/5-6.png?w=526)
Step 6: We have displayed the values requested by the “show” command. He wants our host IP address.
![6-6.png](https://bariskoparmal.files.wordpress.com/2019/10/6-6.png?w=657)
Step 7: We have identified our IP address using the “set host IP address” command.
![7-5.png](https://bariskoparmal.files.wordpress.com/2019/10/7-5.png?w=636)
Step 8: We have a share with the “run” command.
![8-6.png](https://bariskoparmal.files.wordpress.com/2019/10/8-6.png?w=720)
Step 9: We will copy the payload generated and paste it into the notebook. We will then save the file with the extension “.bat”.
![9-7.png](https://bariskoparmal.files.wordpress.com/2019/10/9-7.png?w=908)
Step 10: We will allow the target device to run this file with the “.bat” extension. Of course, I'm gonna run this file on the virtual windows machine that I installed. And when I run it, the image that we're looking at will be like this. So the connection is established.
![10-4.png](https://bariskoparmal.files.wordpress.com/2019/10/10-4.png?w=720)
Step 11: To read information about the keys entered from the keyboard on the victim's device, we will go to the Output file directory inside the Hatkey folder.
![11-1.png](https://bariskoparmal.files.wordpress.com/2019/10/11-1.png?w=462)
Step 12: With the “ls” command, we can see which IP addresses are logged in. The one we run on our Windows machine is the “IPAdresi.senbe.txt” file. “with tail-f IPAdresi.senbe.txt”, we will be able to listen to keyboard information on the victim device momentarily.
![12-2.png](https://bariskoparmal.files.wordpress.com/2019/10/12-2.png?w=661)
Step 13: I logged into Internet Explorer from the victim's device. As the first frame of the screenshot shows, we received information about which site was logged in. In square 2, I wrote "keylogger successful" on the scanner and looked for it. His knowledge came to the place we were listening.
![13-2.png](https://bariskoparmal.files.wordpress.com/2019/10/13-2.png?w=719)
Step 14: If we want to read this information again later, we can open the txt files under the Hatkey/Output folder and read it from within.
![14-1.png](https://bariskoparmal.files.wordpress.com/2019/10/14-1.png?w=679)
Good Lessons...