SlideShare a Scribd company logo
Keylogger
What is keystroke logging?
 A keylogger is a program that runs in the background or hardware,
recording all the keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped raw to the
attacker
 Attacker checks files carefully in the hopes of either finding
passwords, or possibly other useful information.
What is keystroke logging?
 Key loggers, as a surveillance tool, are often used by
employers to ensure employees use work computers for
business purposes only
 Such systems are also highly useful for law enforcement
and espionage
 Keystroke logging can be achieved by both hardware
and software means.
 Good: companies can monitor the
productivity of an employee, also useful for
software developing.
 Bad: surveillance
 Ugly: External hardware can be caught
easily and software installation without
user noticing is hard.
Hardware key loggers
Come in three types:
Inline devices that are attached to the keyboard
cable
Devices which can be installed inside standard
keyboards
Replacement keyboards that contain the key
logger already built-in
Some hardware keyloggers
 Hardware KeyLogger Stand-alone Edition
a tiny hardware device that can be attached in between
a keyboard and a computer.
 Hardware KeyLogger Keyboard Edition
looks and behaves exactly like a normal keyboard, but it
keeps a record of all keystrokes typed on it.
 KeyGhost Hardware Keylogger
a tiny hardware device that can be attached in between
a keyboard and a computer.
 KeyKatcher Keystroke Logger
a tiny hardware device that can be attached in between
a keyboard and a computer.
Keylogger
The Hardware KeyLogger™ Stand-alone Edition is a
tiny hardware device that can be attached in between a
keyboard and a computer. It keeps a record of all
keystrokes typed on the keyboard. The recording process
is totally transparent to the end user. The keystrokes can
only be retrieved by an administrator with a proper
password.
BEFORE AFTER
Hardware KeyLoggerTM
Keyboard Edition
The Hardware KeyLogger™ Keyboard Edition looks and
behaves exactly like a normal keyborad, but it keeps a
record of all keystrokes typed on it. The recording process
is totally transparent to the end user. The keystrokes can
only be retrieved by an administrator with a proper
password.
KeyKatcher
The KeyKatcher is a hardware device to log activity as it is
performed on the keyboard. The device works with any
PS/2 keyboard and is not dependant on the operating
system because there is not any software required for the
manufacture to product to interact with the hardware.
The KeyKatcher records up to 32,000 bytes (keystrokes) in
the 33k model or 64,000 bytes (key strokes) in the 64k
model. Even if the device is unplugged from the keyboard it
will still remember EVERYTHING and you wont lose a
single keystroke.
Interacting with keylogger
Interacting with the Keystroke logger is
simple, it can be done from any PS/2
compatible keyboard/computer. You can take
it off the computer it is on to examine the data
on another computer or perform the audit
from that computer. Enter into a text program.
Type the passphrase which was set, the
menu will be displayed, you can navigate
through the menus by entering typing in the
number corresponding with the command.
Other approaches
There are other approaches to capturing info
about what you are doing.
Some keyloggers capture screens, rather than
keystrokes.
Other keyloggers will secretly turn on video or
audio recorders, and transmit what they capture
over your internet connection.
Software Key Logging
 Easy to implement – code is relatively
normal.
 Hard to install – user can notice the
presence of it.
Examples of key loggers
 Magic Lantern
 developed by the FBI
 is installed remotely via email attachment.
 All in One Keylogger Spy Software
 sends encrypted logs to desired email
 tracks all users activity
Examples of key loggers (cont.)
 Wiretap Pro
 specializes in Internet monitoring
 records chats, emails, web sites visited
 Ardamax Keylogger
 monitors user activity in an encrypted way
 data is stored as text or web page
 used to maintain backups or monitor kids.
Defending from a key logger
 Have our computer up to date with:
 Keep net firewall on
 Anti-spywares
 Anti-viruses
 Check USB ports and PS/2
 Check programs installed
 Also we can maintain a practice of using
only the soft keyboard (on screen).
However is not completely secure.

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
Maxime ALAY-EDDINE
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
Mijanur Rahman Milon
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Access Controls
Access ControlsAccess Controls
Access Controls
primeteacher32
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
Software security
Software securitySoftware security
Software security
Roman Oliynykov
 
System security
System securitySystem security
System security
invertis university
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
Raghav Bisht
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
Divyank Jindal
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Software security
Software securitySoftware security
Software security
 
System security
System securitySystem security
System security
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Network security
Network securityNetwork security
Network security
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Similar to Keyloggers.ppt

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
Abhishek Hirapara
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
SnehithaKurimelli
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
Bibek Sharma
 
Keylogger for mac
Keylogger for macKeylogger for mac
Keylogger for mac
keyloggerfor mac
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
KashifKhan417
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
 
D-Cipher
D-CipherD-Cipher
43 automatic
43 automatic43 automatic
43 automatic
aissmsblogs
 
487777508-KeyloggerPresentation-1-pptx.pptx
487777508-KeyloggerPresentation-1-pptx.pptx487777508-KeyloggerPresentation-1-pptx.pptx
487777508-KeyloggerPresentation-1-pptx.pptx
talkaton
 
M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5Allan Jackson
 
111 03 hardware 1 input
111 03 hardware 1 input111 03 hardware 1 input
111 03 hardware 1 input
Christian Gabriel
 
Computer system
Computer systemComputer system
Computer system
RajThakuri
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
Flexera
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
Patel Mit
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
Nutan Kumar Panda
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
Multisoft Virtual Academy
 

Similar to Keyloggers.ppt (20)

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
Keylogger for mac
Keylogger for macKeylogger for mac
Keylogger for mac
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
43 automatic
43 automatic43 automatic
43 automatic
 
487777508-KeyloggerPresentation-1-pptx.pptx
487777508-KeyloggerPresentation-1-pptx.pptx487777508-KeyloggerPresentation-1-pptx.pptx
487777508-KeyloggerPresentation-1-pptx.pptx
 
Demo
DemoDemo
Demo
 
M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5M w f in-class 12.2.11 and homework for 12.5
M w f in-class 12.2.11 and homework for 12.5
 
Aiman
AimanAiman
Aiman
 
111 03 hardware 1 input
111 03 hardware 1 input111 03 hardware 1 input
111 03 hardware 1 input
 
Computer system
Computer systemComputer system
Computer system
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
FlexNet Publisher Licensing Security
FlexNet Publisher Licensing SecurityFlexNet Publisher Licensing Security
FlexNet Publisher Licensing Security
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 

More from Chetanmalviya8

Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDF
Chetanmalviya8
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
Chetanmalviya8
 
WirelessLANs.pptx
WirelessLANs.pptxWirelessLANs.pptx
WirelessLANs.pptx
Chetanmalviya8
 
OOAD PRESENTATION.pptx
OOAD PRESENTATION.pptxOOAD PRESENTATION.pptx
OOAD PRESENTATION.pptx
Chetanmalviya8
 
Graph Coloring
Graph ColoringGraph Coloring
Graph Coloring
Chetanmalviya8
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
 
Monitors.ppt
Monitors.pptMonitors.ppt
Monitors.ppt
Chetanmalviya8
 

More from Chetanmalviya8 (7)

Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDF
 
Botnet.pptx
Botnet.pptxBotnet.pptx
Botnet.pptx
 
WirelessLANs.pptx
WirelessLANs.pptxWirelessLANs.pptx
WirelessLANs.pptx
 
OOAD PRESENTATION.pptx
OOAD PRESENTATION.pptxOOAD PRESENTATION.pptx
OOAD PRESENTATION.pptx
 
Graph Coloring
Graph ColoringGraph Coloring
Graph Coloring
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Monitors.ppt
Monitors.pptMonitors.ppt
Monitors.ppt
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Keyloggers.ppt

  • 2. What is keystroke logging?  A keylogger is a program that runs in the background or hardware, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker  Attacker checks files carefully in the hopes of either finding passwords, or possibly other useful information.
  • 3. What is keystroke logging?  Key loggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only  Such systems are also highly useful for law enforcement and espionage  Keystroke logging can be achieved by both hardware and software means.
  • 4.  Good: companies can monitor the productivity of an employee, also useful for software developing.  Bad: surveillance  Ugly: External hardware can be caught easily and software installation without user noticing is hard.
  • 5. Hardware key loggers Come in three types: Inline devices that are attached to the keyboard cable Devices which can be installed inside standard keyboards Replacement keyboards that contain the key logger already built-in
  • 6. Some hardware keyloggers  Hardware KeyLogger Stand-alone Edition a tiny hardware device that can be attached in between a keyboard and a computer.  Hardware KeyLogger Keyboard Edition looks and behaves exactly like a normal keyboard, but it keeps a record of all keystrokes typed on it.  KeyGhost Hardware Keylogger a tiny hardware device that can be attached in between a keyboard and a computer.  KeyKatcher Keystroke Logger a tiny hardware device that can be attached in between a keyboard and a computer.
  • 7. Keylogger The Hardware KeyLogger™ Stand-alone Edition is a tiny hardware device that can be attached in between a keyboard and a computer. It keeps a record of all keystrokes typed on the keyboard. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password. BEFORE AFTER
  • 8. Hardware KeyLoggerTM Keyboard Edition The Hardware KeyLogger™ Keyboard Edition looks and behaves exactly like a normal keyborad, but it keeps a record of all keystrokes typed on it. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password.
  • 9. KeyKatcher The KeyKatcher is a hardware device to log activity as it is performed on the keyboard. The device works with any PS/2 keyboard and is not dependant on the operating system because there is not any software required for the manufacture to product to interact with the hardware. The KeyKatcher records up to 32,000 bytes (keystrokes) in the 33k model or 64,000 bytes (key strokes) in the 64k model. Even if the device is unplugged from the keyboard it will still remember EVERYTHING and you wont lose a single keystroke.
  • 10. Interacting with keylogger Interacting with the Keystroke logger is simple, it can be done from any PS/2 compatible keyboard/computer. You can take it off the computer it is on to examine the data on another computer or perform the audit from that computer. Enter into a text program. Type the passphrase which was set, the menu will be displayed, you can navigate through the menus by entering typing in the number corresponding with the command.
  • 11. Other approaches There are other approaches to capturing info about what you are doing. Some keyloggers capture screens, rather than keystrokes. Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.
  • 12. Software Key Logging  Easy to implement – code is relatively normal.  Hard to install – user can notice the presence of it.
  • 13. Examples of key loggers  Magic Lantern  developed by the FBI  is installed remotely via email attachment.  All in One Keylogger Spy Software  sends encrypted logs to desired email  tracks all users activity
  • 14. Examples of key loggers (cont.)  Wiretap Pro  specializes in Internet monitoring  records chats, emails, web sites visited  Ardamax Keylogger  monitors user activity in an encrypted way  data is stored as text or web page  used to maintain backups or monitor kids.
  • 15. Defending from a key logger  Have our computer up to date with:  Keep net firewall on  Anti-spywares  Anti-viruses  Check USB ports and PS/2  Check programs installed  Also we can maintain a practice of using only the soft keyboard (on screen). However is not completely secure.