Many times we have private data on our pen drives securely hidden but still there is chance of it being found. is there any way or tool which secretly records on the pendrive itself a log kind of file of whatever has been viewed and/or copied from it?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
Become an Elite Hacker Part 4: Hacking a Website. [Part 1]
-
How To: Use an ESP8266 Beacon Spammer to Track Smartphone Users
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Hack Like It's 1987 (An Introduction to the Telehack Retro Game)
-
How To: Automate Wi-Fi Hacking with Wifite2
-
How To: Dox Anyone
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message
-
Tutorial: DNS Spoofing
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Escape Restricted Shell Environments on Linux
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Hack Wi-Fi Networks with Bettercap
-
How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools
3 Responses
What I would suggest to you sir, would be to invest in a usb rubber ducky. This hacking tool is disguised as a usb but the computer thinks it's a keyboard, so anything you write to the sd card on the ducky will be injected into the computer at superhuman speeds. This usb rubber ducky has a feature called Twin Ducky, which will allow you to take files from the target computer in under ten seconds and take out the usb rubber ducky quickly. For more information on this device I would visit
http://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe?variant=353378649
i dont want any data from the target computer.. all i want to know is what files of my pd has been accessed and/or copied
The rubber ducky can do that to. It's basically like a really fast keyboard that lets you type anything you want at a superhuman speed, and copy data to another drive.
Share Your Thoughts