Skip to main content

Incremental Hacking

No hacking attempt is guaranteed. There is a lot that can go wrong when you attempt to remotely and secretly install spy software.

Things that can go wrong:

  • The target can choose not to open the payload. Even after some good social engineering, there will be a lot of targets that will know better than to open the attachment.
  • The target can open the payload on a device (Operating System) that does not support the specific payload.
  • The target computer can have a two-way firewall (not the standard Windows Firewall) that can block the data from being sent.
  • The target computer can have very strict Anti-Virus that will block any program that is not known and trusted.

Ways to improve your chances of success:

The first thing you can do is use a targeted attack against a specific target. You find out as much as you can (facebook, google, etc) about the target. You can use information that might look very insignificant to others to improve your social engineering con (I will explain in more detail with the example in this article). This type of attack is called spear phishing and will greatly improve your chances of success compared to phishing where you simply 'attack' a list of targets and hope for the best.

Another way to improve your chances of success is to use incremental hacking

With incremental hacking you first do a type of attack that has a higher success rate and usually lower reward before moving to the next phase with a lower success rate but greater reward. That way, if the target get suspicious during the last phase and the attempt fails, then at least you have some information about the target.

This multi-phase attack also has the advantage that you can prepare (through social engineering) the target for the final payload so that he is willing and ready to run it.

Example of Incremental Hacking

You did your homework and from facebook you learned that the target is a big Miley Cyrus fan.

The Con

You create a profile (facebook google+ or simply an email address at yahoo, gmail, etc) and give the impression that you are also a Miley fan (the things we sometimes need to do …). You could alternatively create an email that will let it look like some sort of special fan group.

You will then email the target a link to a Miley video where you will only get the target's username and password using a phshing website – high success rate – Phase 1.

After you successfully retrieved the target's username and password, you can then email the target another 'naughty' video of Miley that is not freely available on the internet. Once the target try to run this video, you will have full monitoring of the target computer – lower success rate but higher reward – Phase 2.

Let's see how this can be done:

Phase 1: Phishing Website

After our first phase, we don't want the target to become suspicious. We want the target to trust as even more. So the first phase of the con is very important. We search the web (youtube or any other video service) for an actual video of Miley that will give the target the impression that there was a reason why the video was somewhat restricted (maybe a real sexy/naughty video).

We use that link to create our phishing website with redpill Hacker.

redpill Hacker will create the phishing site for us (see the redpill Hacker Phishing Website Video  for more detail on how the website is created by redpill Hacker).

We then make a couple of changes to one of the many social engineering templates in redpill Hacker to fit in with our con. We let redpill Hacker email the target.

The target will get an email with a link to the video. When the target want to view the video, he will be prompted to sign in using his social media account (gmail, yahoo, facebook, twitter) – as are the case with many sites and content on the internet. After he signed in, he will be able to watch the video and will not suspect anything.

We however, would have received his username and password!

This type of attack as a very high success rate as nothing needed to be installed on the target computer. It works on any device and operating system and there is no warning messages.

Phase 2: Emailing the Payload

The second phase of the attack has a lower success rate as we want to remotely install a spy program on the target computer. If this however fails, then at least we already have the target's login details for one of his accounts that will give us a lot of information about the target (remember, some users will use the same password for all their accounts).

We also now already established contact with the target and the target will now have a sense of familiarity that will help us with the next attack.

Using the 'video' social engineering template in redpill Hacker, we create a video payload and email it to the target. We tell the target that this video is not freely available on the internet as it has some shocking content of Miley.

When the target wants to run the video player we attached, he might get the standard UAC message from Windows or a warning from his Anti-Virus that it is not a known and trusted application. We however did explain in the email that we are using a new video encryption program to attach the video so the target will be expecting the message and allow it to run.

If the target allow the payload to run, we will start to receive data (IP Address, keylogs, screenshots) from the target.

Not only will an incremental attack increase your chances off success during the final phase, it will also reduce exposure to your payloads (see why this is important) and also leave you with at least access to the target's social media account if the final attempt is not successful.

For more information about redpill Hacker, visit


  1. Thanks for sharing, nice post!

    Giúp các mẹ giải đáp thắc mắc những thực phẩm giàu canxi cho bé không hay trẻ bị ho thì triệu chứng thiếu canxi ở trẻ sơ sinh hay trẻ bị viêm phế quản với có nên dùng dầu khuynh diệp cho trẻ sơ sinh như thế nào hay bổ sung sắt cho trẻ có tốt cho trẻ không hay bổ sung vitamin d cho trẻ sơ sinh bật máy lạnh máy quạt hay không hay thực phẩm giàu sắt hay có nên cho trẻ ngồi xe tập đi hay bé 6 tháng tuổi ăn dặm mấy bữa 1 ngày không bật đèn sáng thì có nên băng rốn cho trẻ sơ sinh khi ngủ hay trẻ tiêm phòng bị sốt bao lâu bằng mật ông hiệu quả hay có nên dùng miếng dán hạ sốt cho trẻ hay không hay ngậm vú giả trẻ em thì tham khảo có nên cho trẻ ăn nước xương hầm hay không hay có nên nêm gia vị cho bé ăn dặm hay không hay mua hàng giá rẻ trực tuyến trên ebay thì tham khảo mua hàng trên ebay hay tham khảo blog về siêu thị và blog về trẻ em có nên ăn thì để biết chăm sóc bé hay để biết có nên cho trẻ trước khi uống hay để biết cho trẻ ăn nhiều có tốt không hay cháo hạt sen cho bé tốt nhất ăn dặm hay sóng wifi có ảnh hưởng đến trẻ sơ sinh không


Post a Comment

Popular posts from this blog

How to remotely install spy software

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product for installing spy software remotely: redpill Hacker
You can also have a look at newer articles with better tools at: -----------------------------------------------------------------------------------------------
In a previous article we discussed how to get usernames and passwords from other users on a computer you have access to. We will now look at how to install spy software on a computer you do not have access to … even if the computer is on the other side of the world.

Step 1: Get quality Spy Software

You will need quality spy software that can be remotely installed and is not easily detected and removed by anti-virus. There are a couple of key loggers that can be installed remotely, but very few that can secretly be remotely installed.

redpill Detective has been designed to be covertly installed…

Sending a spy program with gmail

To install a spy program remotely you need to email the target an install module. Spy software like redpill Agent and redpill Detective allows you to hide the install module within a 'cover application' . When emailing the target the install module, you will need either zip the file, embed it into wordpad or send it as a link as most email service providers doesn't allow you to add executables (exe's) as attachments.

To see how to send the spy program as a link see 'Installing spy software with a link'.
To see how to embed the spy program in wordpad, see  'How to remotely install spy software'.

Using a zipped file for the attachment can be a problem when either you or your target is using gmail as gmail will block attachments that contain executables even when they are zipped.

There is however a simple solution to the problem:

Add a password to your zip file

In winrar and winzip you can choose to add a password to your zip/rar file. When you add a passwo…

How to get a username and password

---------------------------------------------------------------------------------------------- Update (2015/07/07):  redpill now has a new and better product available: redpill Hacker

You can also see more up to date articles at:
This article will explain how to get a username and password for an email account like gmail or yahoo or a social network account like facebook.

In this article we will focus on getting a username and password of another user (the target) on a computer that you have access to. In a following article we will explain how to get a username and password from someone that works on a computer that you do not have access to that might be in another part of the world.

Step 1: Install a key logger

You will need to download and install a key logger that is not easily detected by anti-virus software and that is completely hidden and discreet