
 Introduction
 Why?
 Types
 Detection and Preventaion
 How Keylogger protect Itself from user?
Today We’ll discuss

 Tools used for monitoring and Capturing key stroke
pressed on Key board.
 person using the keyboard is unaware that t...
 To monitor the User’s Activity.
 To monitor child Activity in the absence of their parents.
 To see the Employee’s pe...

 Software Based Key Logger
 Hardware Based Key Logger
Types

Hypervisor-based: As virtual Machine
e.g. Blue Pills
Kernel-based:difficult to write and detect
e.g. Device Driver
AP...
 Data is uploaded to a website, database or an FTP server.
 Data is periodically emailed to a pre-defined email address...

 Keyboard hardware
 Wireless keyboard sniffers:
 Keyboard overlays (Double Layered )
 Acoustic keyloggers(Mobile Kep...

 This method is very popular stealing ATM machine
PIN.
Keyboard OverLay

Optical surveillance
(Spy Camera)

 It is Like a pendrive which is invisible on computer.
 Press hot key to make it visible.
 There are large no of repo...
 Hiding process on Task Manager.
 Giving False Name like
rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e
xe
Running...
 Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot
 Enable “Image Path Name” of Task Manager On windows
 Check startup app...

 Use Speech to Text Services.
 Use Hand writing recognition Tools.
 Type Password randomly
if Your password is a1b2c3...

Screen Shot of Enabling Image Path
Name

Be Safe
Be Happy 
Thank You
Key logger,Why? and  How to prevent Them?
Upcoming SlideShare
Loading in …5
×

Key logger,Why? and How to prevent Them?

954 views

Published on

Presentation on Keylogger,Its types and its merits demerits
and prevention Technique

Published in: Technology
  • Be the first to like this

Key logger,Why? and How to prevent Them?

  1. 1.   Introduction  Why?  Types  Detection and Preventaion  How Keylogger protect Itself from user? Today We’ll discuss
  2. 2.   Tools used for monitoring and Capturing key stroke pressed on Key board.  person using the keyboard is unaware that their actions are being monitored.  One of the Type Of Spyware . Key Logger Introduction
  3. 3.  To monitor the User’s Activity.  To monitor child Activity in the absence of their parents.  To see the Employee’s performance in Corporation  To Backup data from accidental Loss.  To steal the sensitive information Like username, Password, credit card no. , pin code …… Why?
  4. 4.   Software Based Key Logger  Hardware Based Key Logger Types
  5. 5.  Hypervisor-based: As virtual Machine e.g. Blue Pills Kernel-based:difficult to write and detect e.g. Device Driver API-based: Easy to write and easy to kill e.g. Getasynckeystate() function Form grabbing based :log web form submissions by recording the web browsing onsubmit event functions before encryption Software Based Key Logger
  6. 6.  Data is uploaded to a website, database or an FTP server.  Data is periodically emailed to a pre-defined email address.  Data is wirelessly transmitted by means of an attached hardware system.  The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.  Clipboard logging  Screen Logging Some Extra features
  7. 7.   Keyboard hardware  Wireless keyboard sniffers:  Keyboard overlays (Double Layered )  Acoustic keyloggers(Mobile Kepad Tone )  Optical surveillance(CC Camera,Spy camera) Hardware Based Keylogger
  8. 8.   This method is very popular stealing ATM machine PIN. Keyboard OverLay
  9. 9.  Optical surveillance (Spy Camera)
  10. 10.   It is Like a pendrive which is invisible on computer.  Press hot key to make it visible.  There are large no of report Files,just open and see the Reports. Hardware Keylogger Report reading Process
  11. 11.  Hiding process on Task Manager.  Giving False Name like rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e xe Running Mutual Monitoring Process side by side. Writing Driver which prevent it from killing. Calling dll file using rundll32.exe Keylogger uses Hot Key and password to protect their Data. e.g. HotKey :- Shift+Alt+S How Keyloggers protect Itself from user?
  12. 12.  Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot  Enable “Image Path Name” of Task Manager On windows  Check startup application , msconfig.exe  Clear Browser’s cookies after using public Computer.  Use Live CD while using other’s Computer.  Use On-screen Keyboard while entering password.  Use different Keyboard Layout.  Use Smart Card . Detection And Prevention
  13. 13.   Use Speech to Text Services.  Use Hand writing recognition Tools.  Type Password randomly if Your password is a1b2c3d4 then first type 1234 & then click at first position enter a similar click on other proper position and enter corresponding letter ,then Key logger logs seems to be [click]a[click]b[click]c[click]d Detection And Prevention
  14. 14.  Screen Shot of Enabling Image Path Name
  15. 15.  Be Safe Be Happy  Thank You

×