SlideShare a Scribd company logo
1 of 23
SPYWARES
&
KEYLOGGERS
Presented By
JITHIN JAMES

Introduction

What areSpywares?

What areKey loggers?

Demo
Outline
What Are Spywares ?

Applicationsthat send information from your
computer to thecreator of thespyware

Consistsof an corefunctionality and ahidden
functionality of information gathering

Can beused for marketing information, to determine
their stancewith regard to competitorsand market
trends

Can also beused to log keystrokesand send thoseto
whomever
Definition
Spywareissoftware

that aidsin gathering information about a
person or organization

without their knowledge

may send such information to another
entity without theconsumer'sconsent

assertscontrol over acomputer
without theconsumer'sknowledge.
Spyware Symptoms
Themajor symptomsare

reset your browser'shomepage

produceeven moreinvasiveadvertisements

“pop-up” ads

unwanted CPU activity

disk usage

network traffic

applicationsfreezing

failureto boot

system-widecrashes
Spyware Symptoms(Continued)
Types of Spyware
Spywarecan bebroken down into four different
categories:

System monitors

Trojans

Adware

Tracking cookies
System Monitors

Tracking Softwareused to monitor computer activity

keystrokes, e-mails, chat room conversations, instant
messages, Web sitesvisited, programsrun, timespent on
Web sitesor using programs, or user-namesand
passwords.

Theinformation istypically either stored for later
retrieval or transmitted to theremoteprocessor person
employing theMonitor

Key-loggersand Screen Scrapersaretypesof System
Monitors.
Trojans

TrojansHorsesor Trojansaremaliciousprogramsthat appear
asharmlessor even desirableapplications.

Designed to causelossor theft of computer data, and to
destroy your system.

Seven major types

RemoteAccessTrojans

DataSending Trojans

DestructiveTrojans

Proxy Trojans

FTPTrojans

Security SoftwareDisabler Trojans

Denial-of-Serviceattack (DoS) Trojans
Trojans(Continued)
Trojans(Continued)

NotableTrojans

NetbusAdvanceSystem Care(by Carl-Fredrik
Neikter)

Subseven or Sub7(by Mobman)

Back Orifice(Sir Dystic)

Beast

Zeus

Flashback Trojan (Trojan BackDoor.Flashback)

ZeroAccess

Koobface

Vundo
Adware

It isany softwarepackagewhich automatically renders
advertisementsin order to generaterevenuefor itsauthor.

Softwarethat displayspop-up advertisementstuned to the
userscurrent activity, potentially reporting aggregateor
anonymized browsing behavior to athird party

Track personal information (including your age, gender,
location, buying preferences, surfing habits, etc.)
Tracking Cookies

Cookiesthat can track your Web activities

May includecookiesthat contain
• user names
• passwords

other privateinformation that you enter on
web sites(SSN, banking info, credit cards)
Preventive Techniques

Don't install any application unlessyou arecertain of what it
does or where it came from.

Alwaysread thelicenseagreement

Softwareand OSupgrades

Utilizebrowser'ssecurity settings

UseAnti-Spyware

Spy Sweeper

Microsoft WindowsAnti-Spyware

SpywareDoctor

SpywareSlayer

Spy Killer

Spy Remover
What are Keyloggers?

Keystrokelogging, or keyboard capturing

theaction of recording (or logging) thekeys
struck on akeyboard, typically in acovert manner

so that theperson using thekeyboard isunaware
that their actionsarebeing monitored
Typesof Keyloggers
HardwareKeyloggers SoftwareKeyloggers
Installs in 5 seco nds, simply plug
it in.
Requires a passwo rd to lo g into
the co mputer.
Can be installed witho ut lo gging
into the co mputer.
Requires administratio n rights to
install.
Can be remo ved, and the
info rmatio n retrieved o n ano ther
co mputer.
Requires that so ftware be installed
o n the co mputer.
Requires reaching behind the
co mputer to plug the device in.
Can reco rd o perating system
events such as page file size, etc.
HardwareKeylogger
SoftwareKeylogger
Some Examples

Actual Spy Keylogger

Ardamax Keylogger

Ghost Keylogger

Golden Keylogger

HomeKeylogger

InvisibleKeylogger

KGB Keylogger

RemoteKeylogger

Soft Central Keylogger

Stealth Keylogger
DEMO – 1
Actual Spy Keylogger
THANKYOU

More Related Content

What's hot

Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksIAEME Publication
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Malware
MalwareMalware
Malware
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacks
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Malware and security
Malware and securityMalware and security
Malware and security
 

Viewers also liked

Viewers also liked (10)

Keylogger
KeyloggerKeylogger
Keylogger
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Virtual keyboard ppt
Virtual keyboard pptVirtual keyboard ppt
Virtual keyboard ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Spywares & Keyloggers

Similar to Spywares & Keyloggers (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Spyware
SpywareSpyware
Spyware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
spyware
spywarespyware
spyware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Security Software
Security SoftwareSecurity Software
Security Software
 

Recently uploaded

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 

Spywares & Keyloggers

  • 3.
  • 4. What Are Spywares ?  Applicationsthat send information from your computer to thecreator of thespyware  Consistsof an corefunctionality and ahidden functionality of information gathering  Can beused for marketing information, to determine their stancewith regard to competitorsand market trends  Can also beused to log keystrokesand send thoseto whomever
  • 5.
  • 6. Definition Spywareissoftware  that aidsin gathering information about a person or organization  without their knowledge  may send such information to another entity without theconsumer'sconsent  assertscontrol over acomputer without theconsumer'sknowledge.
  • 7. Spyware Symptoms Themajor symptomsare  reset your browser'shomepage  produceeven moreinvasiveadvertisements  “pop-up” ads  unwanted CPU activity  disk usage  network traffic  applicationsfreezing  failureto boot  system-widecrashes
  • 9. Types of Spyware Spywarecan bebroken down into four different categories:  System monitors  Trojans  Adware  Tracking cookies
  • 10. System Monitors  Tracking Softwareused to monitor computer activity  keystrokes, e-mails, chat room conversations, instant messages, Web sitesvisited, programsrun, timespent on Web sitesor using programs, or user-namesand passwords.  Theinformation istypically either stored for later retrieval or transmitted to theremoteprocessor person employing theMonitor  Key-loggersand Screen Scrapersaretypesof System Monitors.
  • 11. Trojans  TrojansHorsesor Trojansaremaliciousprogramsthat appear asharmlessor even desirableapplications.  Designed to causelossor theft of computer data, and to destroy your system.  Seven major types  RemoteAccessTrojans  DataSending Trojans  DestructiveTrojans  Proxy Trojans  FTPTrojans  Security SoftwareDisabler Trojans  Denial-of-Serviceattack (DoS) Trojans
  • 13. Trojans(Continued)  NotableTrojans  NetbusAdvanceSystem Care(by Carl-Fredrik Neikter)  Subseven or Sub7(by Mobman)  Back Orifice(Sir Dystic)  Beast  Zeus  Flashback Trojan (Trojan BackDoor.Flashback)  ZeroAccess  Koobface  Vundo
  • 14. Adware  It isany softwarepackagewhich automatically renders advertisementsin order to generaterevenuefor itsauthor.  Softwarethat displayspop-up advertisementstuned to the userscurrent activity, potentially reporting aggregateor anonymized browsing behavior to athird party  Track personal information (including your age, gender, location, buying preferences, surfing habits, etc.)
  • 15. Tracking Cookies  Cookiesthat can track your Web activities  May includecookiesthat contain • user names • passwords  other privateinformation that you enter on web sites(SSN, banking info, credit cards)
  • 16. Preventive Techniques  Don't install any application unlessyou arecertain of what it does or where it came from.  Alwaysread thelicenseagreement  Softwareand OSupgrades  Utilizebrowser'ssecurity settings  UseAnti-Spyware  Spy Sweeper  Microsoft WindowsAnti-Spyware  SpywareDoctor  SpywareSlayer  Spy Killer  Spy Remover
  • 17. What are Keyloggers?  Keystrokelogging, or keyboard capturing  theaction of recording (or logging) thekeys struck on akeyboard, typically in acovert manner  so that theperson using thekeyboard isunaware that their actionsarebeing monitored
  • 18. Typesof Keyloggers HardwareKeyloggers SoftwareKeyloggers Installs in 5 seco nds, simply plug it in. Requires a passwo rd to lo g into the co mputer. Can be installed witho ut lo gging into the co mputer. Requires administratio n rights to install. Can be remo ved, and the info rmatio n retrieved o n ano ther co mputer. Requires that so ftware be installed o n the co mputer. Requires reaching behind the co mputer to plug the device in. Can reco rd o perating system events such as page file size, etc.
  • 21. Some Examples  Actual Spy Keylogger  Ardamax Keylogger  Ghost Keylogger  Golden Keylogger  HomeKeylogger  InvisibleKeylogger  KGB Keylogger  RemoteKeylogger  Soft Central Keylogger  Stealth Keylogger
  • 22. DEMO – 1 Actual Spy Keylogger