Вы находитесь на странице: 1из 13

KEYLOGGER

Project by:-
Dhruvkumar Goswami(1620BECE30094)
Harsh Dodiya(1620BECE30100)
What is a keylogger?
• A key logger is a program that runs in the background or hardware, recording
all the keystrokes. Once keystrokes are logged, they are hidden in the machine for
later retrieval, or shipped raw to the attacker.

• Attacker checks files carefully in the


hopes of either finding passwords, or possibly other useful information.

• Keyloggers are a form of spyware where users are unaware their actions are being
tracked.
What is a keylogger?
•Such systems are also highly useful for law enforcement and espionage.

•Keystroke logging can be achieved by both hardware and software means.

•Keylogging is also known as Keystroke logging.

•Keyloggers can be used for a variety of purposes, hackers may use them to
maliciously gain access to your private information, while employers might
use them to monitor employee activities.
Types of Keyloggers
There are different types of Keyloggers divided into two main groups.

1.Hardware Keyloggers
2.Software Keyloggers
Hardware keylogger
•Hardware keyloggers are used for keystroke logging, a method of capturing and
recording computer users' keystrokes, including sensitive passwords.
•They can be implemented via BIOS-level firmware, or alternatively, via a device
plugged in line between a computer keyboard and a computer. They log all keyboard
activity to their internal memory.

•All hardware keylogger devices have to have the following:


• A microcontroller- this interprets the datastream between the keyboard and computer,
processes it, and passes it to the non-volatile memory.
• A non-volatile memory device, such as flash memory - this stores the recorded data,
retaining it even when power is lost.
Hardware Keylogger
•Hardware-based keyloggers can monitor your activities without any software being installed
at all. Examples of these include:

• Keyboard hardware - These loggers take the form of a piece of hardware inserted
somewhere between the computer keyboard and the computer, typically along the
keyboard's cable connection.

• There are of course more advanced implementation methods that would prevent any
device from being visible externally.

• This type of hardware keylogger is advantageous because it is not dependent on any


software nor can it be detected by any software.

• Wireless keyboard sniffers - It is possible for the signals sent from a wireless keyboard
to its receiver to be intercepted by a wireless sniffer.
Some hardware keyloggers
• Keyboard overlays - Overlays are popular in ATM theft cases where thieves
capture a user's PIN number. This device is designed to blend in with the
machine so that people are unaware of its presence.

• Hardware KeyLogger Stand-alone Edition- A tiny hardware device that can


be attached in between a keyboard and a computer.

• KeyGhost Hardware Keylogger-A tiny hardware device that can be attached


in between a keyboard and a computer.

• KeyKatcher Keystroke Logger- A tiny hardware device that can be attached in


between a keyboard and a computer.
Software Keylogger
• Software keyloggers track system,collect keystroke data within the target op
erating system, store them on disk or in remote location, and send them to
the attacker who installed the keyloggers.

• Anti malware, personal firewall, and Host-based Intrusion prevention(HIPS)


solution detect and remove application keyloggers.
Some Software Keyloggers

•Magic Lantern
◦ developed by the FBI
◦ is installed remotely via email attachment.

•All in One Keylogger Spy Software


◦ sends encrypted logs to desired email
◦ tracks all users activity
Some Software Keyloggers
•Wiretap Pro
◦ specializes in Internet monitoring
◦ records chats, emails, web sites visited.

•Ardamax Keylogger
◦ monitors user activity in an encrypted way
◦ data is stored as text or web page
◦ used to maintain backups or monitor kids.
Software keylogger detection
methods
•Scan local drive for log.txt or other log file names associate with
known keyloggers.

•Implement solution that detect unauthorized file transfer via FTP or


other protocols.

•Scan content sent via email or other authorized means looking for sensitive informatio
n.

•Detect encrypted files transmitted to questionable destinations.


Keylogger: Pros and Cons
•Pros:
• Used in Ethical Hacking.
• Protect Confidential Information.
• Used to know defects in keyboard.
Used in cyber security.

•Cons:
• Zero Privacy.
• Release of sensitive information.
• Unauthorised access.
References
•http://www.ardamax.com/
•http://www.keyghost.com/
•http://www.keykatcheruk.co.uk/
•http://www.relytec.com/
•http://www.securitystats.com/
•http://en.wikipedia.org/Key_logger
•http://www.windowsnetworking.com/
•http://www.wiretappro.com/

Вам также может понравиться