Академический Документы
Профессиональный Документы
Культура Документы
Project by:-
Dhruvkumar Goswami(1620BECE30094)
Harsh Dodiya(1620BECE30100)
What is a keylogger?
• A key logger is a program that runs in the background or hardware, recording
all the keystrokes. Once keystrokes are logged, they are hidden in the machine for
later retrieval, or shipped raw to the attacker.
• Keyloggers are a form of spyware where users are unaware their actions are being
tracked.
What is a keylogger?
•Such systems are also highly useful for law enforcement and espionage.
•Keyloggers can be used for a variety of purposes, hackers may use them to
maliciously gain access to your private information, while employers might
use them to monitor employee activities.
Types of Keyloggers
There are different types of Keyloggers divided into two main groups.
1.Hardware Keyloggers
2.Software Keyloggers
Hardware keylogger
•Hardware keyloggers are used for keystroke logging, a method of capturing and
recording computer users' keystrokes, including sensitive passwords.
•They can be implemented via BIOS-level firmware, or alternatively, via a device
plugged in line between a computer keyboard and a computer. They log all keyboard
activity to their internal memory.
• Keyboard hardware - These loggers take the form of a piece of hardware inserted
somewhere between the computer keyboard and the computer, typically along the
keyboard's cable connection.
• There are of course more advanced implementation methods that would prevent any
device from being visible externally.
• Wireless keyboard sniffers - It is possible for the signals sent from a wireless keyboard
to its receiver to be intercepted by a wireless sniffer.
Some hardware keyloggers
• Keyboard overlays - Overlays are popular in ATM theft cases where thieves
capture a user's PIN number. This device is designed to blend in with the
machine so that people are unaware of its presence.
•Magic Lantern
◦ developed by the FBI
◦ is installed remotely via email attachment.
•Ardamax Keylogger
◦ monitors user activity in an encrypted way
◦ data is stored as text or web page
◦ used to maintain backups or monitor kids.
Software keylogger detection
methods
•Scan local drive for log.txt or other log file names associate with
known keyloggers.
•Scan content sent via email or other authorized means looking for sensitive informatio
n.
•Cons:
• Zero Privacy.
• Release of sensitive information.
• Unauthorised access.
References
•http://www.ardamax.com/
•http://www.keyghost.com/
•http://www.keykatcheruk.co.uk/
•http://www.relytec.com/
•http://www.securitystats.com/
•http://en.wikipedia.org/Key_logger
•http://www.windowsnetworking.com/
•http://www.wiretappro.com/