How to Hack Passwords Using a Hardware Keylogger

Did you know that using a keylogger is the simplest way to hack passwords?. In this post, I will be giving you a detailed information on hardware keyloggers and their working. I will also teach how to make use of a hardware keylogger to hack passwords on your computer. If you are new to the concept of keyloggers or haven’t heard about this topic in the past, then here is a brief description about keyloggers.

A keylogger or sometimes called as a keystroke logger is a stealth computer program or a stealth device (in case of a hardware keylogger) that when installed, captures every keystroke typed on the computer’s keyboard. The keylogger is designed to operate in a total stealth mode so that its presence is hidden from the users of the computer.

A keylogger can be installed by the owner of the computer to capture passwords and other sensitive information that the user types on the keyboard. Keyloggers come in two forms: Software and Hardware.

A software keylogger is a software program that needs to be installed on the computer while the hardware keylogger is a hardware device that needs to be plugged in between the computer and its keyboard. For more information on software keyloggers and their usage, you may refer my previous post: How to use Keyloggers?

How Hardware Keyloggers Work?

Unlike the software keylogger, a hardware keylogger do not depend on any of the software program for its operation as they function at the hardware level itself. A hardware keylogger acts as an interface between the computer and the computer’s keyboard. The device has a built-in memory in which all the recorded keystrokes are stored.

They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB thumb drive or any other computer peripheral so that it does not arouse suspicion in the minds of the users. Therefore by looking at its appearance it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers:

Hardware Keyloggers

How to Install the Hardware Keylogger?

The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is, you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image illustrates how the hardware keylogger is installed.

Using a Hardware Keylogger

Once you install the hardware keylogger as shown above, it starts recording each and every keystroke of the keyboard including passwords and other confidential information. The keystrokes can be retrieved later by downloading the logs onto the hard drive.

Hardware keyloggers are also known to come in the form of a spy keyboard where the keylogger unit is built into the keyboard itself. This will eliminate the need to install a separate device between the keyboard and the computer.

Hardware vs. Software Keylogger:

The following are some of the pros and cons of hardware keylogger:


  • Hardware keyloggers are easy to install and uninstall.

  • Since it operates at the hardware level itself, it is fully compatible with all the operating systems like Windows and Unix.

  • Unlike a software keylogger, it cannot be detected by anti-spywares and anti-keyloggers.


  • Hardware keyloggers are only limited to capturing keystrokes while a high-end software keylogger can capture screenshots, browser activities, IM conversations and many more.

  • Physical access to the target computer is a must in order to install the hardware keylogger, whereas some software keyloggers come with a remote install/uninstall feature.

  • In case of a software keylogger, it is possible to access the logs remotely as they are emailed on a regular basis while this is not possible in case of a hardware keylogger.

Thus, both hardware and software keyloggers have advantages and disadvantages of their own. So, it is up to the user to make a choice based on the requirement.


  1. terry
    December 9, 2008 at 12:13 AM

    how do i get one? and how much?

    • hesam
      November 10, 2012 at 8:15 PM

      Hi I am from Iran, Hessam good website you have someone with you to be my friend? I want to consult with you about hacking please e-mail letter. Thank

  2. Srikanth
    December 13, 2008 at 4:39 PM

    @ terry

    U can get one from

    • yash
      March 30, 2013 at 6:43 PM

      please show the demo of facebook id hack its heartly request

  3. Mf diwan
    December 28, 2008 at 11:06 PM

    It is very informative but the remote keylogger that can be sent by email to the remote pc to be hacked can be detected by a good antivirus. Right!

  4. Raja
    January 13, 2009 at 3:26 AM

    Sir how can i get the logining information by using hardware keylogers

  5. Rafay baloch
    January 17, 2009 at 4:35 PM

    tell to hack with sofware keylogger

  6. Nick
    January 20, 2009 at 8:39 AM

    hey srikanth can you tell me where i can download webmail hack v2.5 for free

  7. faisal
    February 8, 2009 at 9:06 PM

    hi srikanth i need more information ragarding this yahoo fake web site. please help me. i will be thank full. thanking u sir

  8. faisal
    February 8, 2009 at 9:07 PM

    i need more information regarding this plz help

  9. Alen
    March 28, 2009 at 9:50 PM

    faisal…you can go to jaill if you will get cought…that is called Phising and is ILEAGAL !!..

  10. avinash
    May 7, 2009 at 4:48 PM

    how i hack..not getting plz

  11. Redneck
    September 12, 2009 at 11:46 AM

    These things are cool

  12. RVM
    September 18, 2009 at 6:50 PM


    Can u explain in detail on “how to attach a keylogger to an email and send it to victim’s comp”? Win-spy is no more available the website stopped offering trail downloads, pls suggest any other keyloggers other than win-spy and sniper-spy?

  13. Amin
    October 2, 2009 at 2:30 PM

    Dear writer
    someone has installed Award Keylogger on my computer, how can I go through this program? It is password protected, how can I get it’s password? I wanna know that to which email it sends its informations. it is very important

  14. ilak
    December 18, 2009 at 8:41 PM

    some one hav hacked my gmail password and too changed my password? now how can i get back the password?

  15. tarun
    July 13, 2010 at 11:02 PM

    how can i hack a site and oprt

  16. wolf
    November 22, 2010 at 11:42 AM

    Interesting! where can i obtain one 😉

  17. James
    February 13, 2011 at 8:52 AM

    How much key strokes can it store until it stops keeping track of the keystrokes

  18. hashmi
    May 28, 2011 at 11:34 AM

    please explain the step by step sequence process

  19. safal
    February 28, 2012 at 12:21 PM

    hi srikant
    is there any way to recall previous activity using just a keylogger.. i have been hearing about a program but dont know the name..

    March 5, 2012 at 6:38 PM

    how can i extract information if i use keylogger software instead of hardware.

  21. lolkool
    April 15, 2012 at 10:02 AM

    these hacking software only work for your own computer. it monitors the regular performance of your laptop or pc in which means if there are not activities occur in your pc.. you will not able to check anything .

  22. clavinsoe
    December 29, 2012 at 6:34 PM

    how can get it Hardware vs. Software Keylogger my place in myanmar.

Leave A Reply