2.
Introduction
Why?
Types
Detection and Preventaion
How Keylogger protect Itself from user?
Today We’ll discuss
3.
Tools used for monitoring and Capturing key stroke
pressed on Key board.
person using the keyboard is unaware that their
actions are being monitored.
One of the Type Of Spyware .
Key Logger
Introduction
4. To monitor the User’s Activity.
To monitor child Activity in the absence of their parents.
To see the Employee’s performance in Corporation
To Backup data from accidental Loss.
To steal the sensitive information
Like
username, Password, credit card no. , pin code ……
Why?
6.
Hypervisor-based: As virtual Machine
e.g. Blue Pills
Kernel-based:difficult to write and detect
e.g. Device Driver
API-based: Easy to write and easy to kill
e.g. Getasynckeystate() function
Form grabbing based :log web form submissions by
recording the web browsing onsubmit event
functions before encryption
Software Based Key Logger
7. Data is uploaded to a website, database or an FTP server.
Data is periodically emailed to a pre-defined email address.
Data is wirelessly transmitted by means of an attached
hardware system.
The software enables a remote login to the local machine
from the Internet or the local network, for data logs stored on
the target machine to be accessed.
Clipboard logging
Screen Logging
Some Extra features
11.
It is Like a pendrive which is invisible on computer.
Press hot key to make it visible.
There are large no of report Files,just open and see the
Reports.
Hardware Keylogger
Report reading Process
12. Hiding process on Task Manager.
Giving False Name like
rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e
xe
Running Mutual Monitoring Process side by side.
Writing Driver which prevent it from killing.
Calling dll file using rundll32.exe
Keylogger uses Hot Key and password to protect
their Data.
e.g.
HotKey :- Shift+Alt+S
How Keyloggers protect
Itself from user?
13. Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot
Enable “Image Path Name” of Task Manager On windows
Check startup application , msconfig.exe
Clear Browser’s cookies after using public Computer.
Use Live CD while using other’s Computer.
Use On-screen Keyboard while entering password.
Use different Keyboard Layout.
Use Smart Card .
Detection And Prevention
14.
Use Speech to Text Services.
Use Hand writing recognition Tools.
Type Password randomly
if Your password is a1b2c3d4
then first type 1234 & then click at first position enter a
similar click on other proper position and enter
corresponding
letter ,then Key logger logs seems to be
[click]a[click]b[click]c[click]d
Detection And Prevention