Sunteți pe pagina 1din 6

DEMOSNTRATION ABOUT KEYLOGGER

A key logger is a hardware device or a software program that records the real time
activity of a computer user including the keyboard keys they press.

A keylogger can be either a piece of software or a small hardware device that is used to capture
the keystrokes that are typed on the keyboard

There Are Two Types

1. Hardware key logger

2. Software key logger

Hardware key logger-

Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer
users' keystrokes, including sensitive passwords.[1] They can be implemented via BIOS-level firmware,
or alternatively, via a device plugged inline between a computer keyboard and a computer. They log
all keyboard activity to their internal memory.

It is indetified by humans it is attached

The hardware based keylogger can be easily detected because the physical device needs to be
connected in between the keyboard and the USB/PS2 port.

Software key logger is a software which is directly installed in your computer to track a real time activity
Software key logger can be run while being completely invisible and not get noticed by average
computer users. They’ll have to fully depend on security software such as anti-keyloggers or
antivirus packages to tell them that a keylogger is present on the system, or else they have no
idea that everything that they do on the computer is being monitored.

Use Cases for a Key logger

Key loggers are used in Information Technology (IT) organizations to troubleshoot


technical problems with computers and business networks. Key loggers can also be used
by a family (or business) to monitor the network usage of people without their direct
knowledge; they are sometimes used as part of home parental controls.

Finally, malicious individuals may use key loggers on public computers to steal passwords
or credit card information.

What Information a Key logger Can Collect

The capabilities of key loggers vary, but when installed on a device they can generally do
the following:

 capture any passwords entered by users on the device


 take screen captures of the device at periodic intervals
 record the URLs that were visited via Web browsers, and possibly also take screen
captures of the Web pages viewed
 record a list of the applications run by users on the device
 capture logs of all instant messaging (IM) sessions
 capture copies of sent emails
 automatically send the reports containing stored logs and emails to a remote
location (by email, FTP or HTTP).

Most key loggers allow not only keyboard keystrokes to be captured but also are often
capable of collecting screen captures from the computer. Normal key logging programs
store their data on the local hard drive, but some are programmed to automatically
transmit data over the network to a remote computer or Web server.

Where Key loggers Come From and How to Determine if Your Device Has
One

Some key logger software is freely available on the Internet, while others are commercial
or private applications. Key loggers are sometimes part of malwarepack ages
downloaded onto computers without the owners' knowledge. Detecting the presence of
one on a computer can be difficult.

By design, they hide their presence on a system via methods such as

 being installed in hidden directories (folders) on the target system


 cleverly disguising or hiding the application from the operating system task list
(Windows Task Manager and Start screens, Mac OS Activity Monitor, and
equivalent)

So-called anti-key logging programs have been developed to thwart keylogging systems,
and these are often effective when used properly.

Choosing a Key logger That's Right For You

Dozens of key logging systems can be found on the Internet through basic Web searches.
If you're looking for a good key logger solution for your home or business, consider these
factors when making your decision:

 Does it support the right operating systems?


 Are the reports it generates easy to read and access? Key loggers that deliver
nicely formatted reports to your mailbox are much easier to use than those who
keep data scattered in strangely named files on a local hard drive.
 How well does it remain hidden? If the key logger hardware or software runs in
plain sight, family members will likely find and disable it. If it consumes too many
system resources (memory or processing power), it can also unnecessarily
hamper the productivity of users.

Practical Demonstration
1. We are going a internet exploler and search a
software actual keylogger. Then download it and
run it.on victim system nd in installation process
don’t tick a desktop icon nd start menu folder.
2. After installation process run that software and go
to setting and click option on hot key and that key
you will remember what you are changes doing like
in image ctrl+shift+alt+f7 and u change it ctrl+b
then you remember that.

3. After this process you can go on monitoring and


click on start monitoring and monitoring process
will start. then what user are open or what he is
doing on his computer every report can generate
on this.
4. Then go in hide option and sit back after sometime
a user go somewhere open his computer and open
the key logger by shortcut key
5. Then you go in report and create report and. save
it where u want save it.this type of report generate
after save and open. It

How keyloggers spread


Keyloggers spread in much the same way that other malicious programs spread.
Excluding cases where keyloggers are purchased and installed by a jealous spouse or
partner, and the use of keyloggers by security services, keyloggers are mostly spread
using the following methods):

 a keylogger can be installed when a user opens a file attached to an email;


 a keylogger can be installed when a file is launched from an open-access directory
on a P2P network;
 a keylogger can be installed via a web page script which exploits a browser
vulnerability. The program will automatically be launched when a user visits a
infected site;
 a keylogger can be installed by another malicious program already present on the
victim machine, if the program is capable of downloading and installing other
malware to the system.
How to protect yourself from keyloggers
Most antivirus companies have already added known keyloggers to their databases, making
protecting against keyloggers no different from protecting against other types of malicious program:
install an antivirus product and keep its database up to date. However, since most antivirus
products classify keyloggers as potentially malicious, or potentially undesirable programs, users
should ensure that their antivirus product will, with default settings, detect this type of malware. If
not, then the product should be configured accordingly, to ensure protection against most
common keyloggers.

Best Key logger tools-

Free Keylogger
REFOG Free Keylogger

S-ar putea să vă placă și