Key Logging
Ravindranath Porandla
21311A6218
Cyber Security
Contents
What is a keylogger?
1
How does
keyloggers work?
2
Mode of infection
3
2
Uses of keyloggers
Types of keyloggers Symptoms and
prevention
6
5
4
A keylogger, sometimes called a
keystroke logger or keyboard capture,
is a type of surveillance technology
used to monitor and record each
keystroke on a specific computer.
Keylogger software is also available
for use on smartphones, such as the
Apple iPhone and Android devices.
What is a key logger?
3
How does keylogger
work?
Keyloggers work like a surveillance camera.
It captures each key that you enter like a
person sitting behind you and watching all
your activities and store those keystrokes
locally or send them to the remote place.
In addition to the keystrokes, New loggers
are loading with more and more capabilities.
Some new loggers can capture screenshots,
web camera pictures, audio from the
microphone.
Send all the captured data to remotely
sitting operator over the internet or just
stores in its local storage database.
Mode of infection
Hardware keyloggers are mostly plug and
play.
Software version of keylogger has multiple
routes to enter. Here is the list:
Infected links
Phishing Scams
Unauthorised Sources
Supply chain attack
Untrusted third-party
How keyloggers send the
data?
It's up to how the keyloggers are designed
to send the data. It's purely subjective. We
can list some of the standard methods
keyloggers have been using to share the
data.
Most loggers upload the data to a
website, FTP server, database or a
remote storage place.
Sending data through emails are also
quite often.
Hardware variant of keyloggers mostly
stores the data instead of sharing them.
Symptoms of keylogger
infection in computers:
Suspicious Hardware
Unknown process
Keyboard and mouse malfunction
System performance issues
Program errors
Alerts from anti-virus applications
Symptoms of keylogger
infection in smartphones:
Delayed typing
High resource utilization
Camera and microphone malfunction
Enormous heat generation
Program Errors
A hardware-based keylogger is a small device
that serves as a connector between the
keyboard and the computer. The device is
designed to resemble an ordinary keyboard
PS/2 connector, part of the computer cabling or
a USB adaptor.
A keylogging software program does not
require physical access to the user's computer
for installation. It can be purposefully
downloaded by someone who wants to monitor
activity on a particular computer, or it can
be malware downloaded unwittingly and
executed as part of a rootkit or remote
administration Trojan (RAT).
Types of Keyloggers
Prevention
Always pay attention to the signs and
symptoms of keylogger infections.
Awareness is the key.You should gain
some knowledge about the key loggers,
how they look?What are they up to?
Use a good antivirus programs and run
scans from time to time.
Don't download anything from
untrusted websites; don't open
untrusted emails and attachments.
Keep your system and application up to
date.
Keyloggers are often used as a spyware tool by
cybercriminals to steal personally identifiable
information (PII), login credentials and sensitive
enterprise data.
Some uses of keyloggers could be considered ethical or
appropriate in varying degrees. Keylogger recorders
may also be used by:
Employers to observe employees' computer activities;
Parents to supervise their children's internet usage;
Device owners to track possible unauthorized activity
on their devices; or
Law enforcement agencies to analyze incidents
involving computer use.
Uses of Keyloggers
Conclusion
Though not all people are victims to cyber crimes, they
are still at risk.
The complexity and variety of cyberattacks is ever
increasing, with a different type of attack for every
nefarious purpose.
We need to be aware of those Cyber Attacks and how
do they happen?
Thank You
information is wealth
13

Key Logging.pptx.pdf

  • 1.
  • 2.
    Contents What is akeylogger? 1 How does keyloggers work? 2 Mode of infection 3 2 Uses of keyloggers Types of keyloggers Symptoms and prevention 6 5 4
  • 3.
    A keylogger, sometimescalled a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices. What is a key logger? 3
  • 4.
    How does keylogger work? Keyloggerswork like a surveillance camera. It captures each key that you enter like a person sitting behind you and watching all your activities and store those keystrokes locally or send them to the remote place. In addition to the keystrokes, New loggers are loading with more and more capabilities. Some new loggers can capture screenshots, web camera pictures, audio from the microphone. Send all the captured data to remotely sitting operator over the internet or just stores in its local storage database.
  • 5.
    Mode of infection Hardwarekeyloggers are mostly plug and play. Software version of keylogger has multiple routes to enter. Here is the list: Infected links Phishing Scams Unauthorised Sources Supply chain attack Untrusted third-party
  • 6.
    How keyloggers sendthe data? It's up to how the keyloggers are designed to send the data. It's purely subjective. We can list some of the standard methods keyloggers have been using to share the data. Most loggers upload the data to a website, FTP server, database or a remote storage place. Sending data through emails are also quite often. Hardware variant of keyloggers mostly stores the data instead of sharing them.
  • 7.
    Symptoms of keylogger infectionin computers: Suspicious Hardware Unknown process Keyboard and mouse malfunction System performance issues Program errors Alerts from anti-virus applications
  • 8.
    Symptoms of keylogger infectionin smartphones: Delayed typing High resource utilization Camera and microphone malfunction Enormous heat generation Program Errors
  • 9.
    A hardware-based keyloggeris a small device that serves as a connector between the keyboard and the computer. The device is designed to resemble an ordinary keyboard PS/2 connector, part of the computer cabling or a USB adaptor. A keylogging software program does not require physical access to the user's computer for installation. It can be purposefully downloaded by someone who wants to monitor activity on a particular computer, or it can be malware downloaded unwittingly and executed as part of a rootkit or remote administration Trojan (RAT). Types of Keyloggers
  • 10.
    Prevention Always pay attentionto the signs and symptoms of keylogger infections. Awareness is the key.You should gain some knowledge about the key loggers, how they look?What are they up to? Use a good antivirus programs and run scans from time to time. Don't download anything from untrusted websites; don't open untrusted emails and attachments. Keep your system and application up to date.
  • 11.
    Keyloggers are oftenused as a spyware tool by cybercriminals to steal personally identifiable information (PII), login credentials and sensitive enterprise data. Some uses of keyloggers could be considered ethical or appropriate in varying degrees. Keylogger recorders may also be used by: Employers to observe employees' computer activities; Parents to supervise their children's internet usage; Device owners to track possible unauthorized activity on their devices; or Law enforcement agencies to analyze incidents involving computer use. Uses of Keyloggers
  • 12.
    Conclusion Though not allpeople are victims to cyber crimes, they are still at risk. The complexity and variety of cyberattacks is ever increasing, with a different type of attack for every nefarious purpose. We need to be aware of those Cyber Attacks and how do they happen?
  • 13.