SlideShare una empresa de Scribd logo
1 de 29
PRESENT BY :
Ankit Mistry (130280105026)
KEY LOGGERSKEY LOGGERS
&&
SPYWARESSPYWARES
WHAT IS KEY LOGGER????
 A key logger is a program that runs in the
background or hardware, recording all the keystrokes.
Once keystrokes are logged, they are hidden in the
machine for later retrieval, or shipped raw to the
attacker
 Attacker checks files carefully in the hopes of either
finding passwords, or possibly other useful
information.
 Key loggers, as a surveillance tool, are often used by
employers to ensure employees use work computers
for business purposes only
 Such systems are also highly useful for law
enforcement and espionage
 Keystroke logging can be achieved by both hardware
and software means.
 There are two types of keyloggers :
1. Hardware Keylogger
2. Software Keylogger
HARDWARE KEYLOGGER
 Hardware keyloggers are used for keystroke
logging, a method of capturing and recording
computer users' keystrokes, including sensitive
passwords.
 Generally, recorded data is retrieved by typing
a special password into a computer text editor.
 The hardware keyloggers plugged in between
the keyboard and computer detects that the
password has been typed and then presents the
computer with "typed" data to produce a menu.
HARDWARE KEYLOGGERS
Come in three types:
 Inline devices that are attached to the
keyboard cable.
 Devices which can be installed inside
standard keyboards.
 Replacement keyboards that contain the
key logger already built-in.
SOME HARDWARE KEYLOGGERS
 Hardware KeyLogger Stand-alone Edition
a tiny hardware device that can be attached in
between a keyboard and a computer.
 Hardware KeyLogger Keyboard Edition
looks and behaves exactly like a normal keyboard,
but it keeps a record of all keystrokes typed on it.
 KeyGhost Hardware Keylogger
a tiny hardware device that can be attached in
between a keyboard and a computer.
 KeyKatcher Keystroke Logger
a tiny hardware device that can be attached in
between a keyboard and a computer.
 Advantages :
1. Antivirus techniques cannot catch these.
2. Work on all computing platforms.
 Disadvantages :
1. It can be spotted by a suspicious user.
SOFTWARE KEYLOGGERS
 Software keyloggers track system , collect
keystoke data within the target operating
system , store them on disk or in remote location
, and send them to the attacker who installed the
keyloggers.
 Anti malware, personal firewall, and Host-based
Intrusion prevention(HIPS) solution detect and
remove application keyloggers.
Software keylogger detection methods include:
Scan local drive for log.txt or other log file names
associate with known keyloggers.
Implement solution that detect unauthorized file
transfer via FTP or other protocols;
Scan content sent via email or other authorized means
looking for sensitive information;
Detect encrypted files transmitted to questionable
destinations.
Advantages :
1.Are hard to detect
2.Can be deployed remotely via a software vulnerability
attack
3.Are fairly easy to write
Disadvantage :
1.A good antivirus scheme could sniff these out.
2.Far fewer cons with the software, so these are much
more common than hardware-type keyloggers.
EXAMPLE OF WINDOWS
KEYLOGGERS
 Badtrans : a keylogger worm that
exploited vulnerability in outlook
express and internet explorer. It collect
keystrokes and them to various e mail
address.
 Magic lantern: FBI’s own software to
wire tap|log email passing through ISPs.
What Is Spyware ?
 Applications that send information from
your computer to the creator of the
spyware
 Sometimes consists of an apparent core
functionality and a hidden functionality
of information gathering (Trojan)
 Can be used by web sites for marketing
information, to determine their stance
with regard to competitors and market
trends
 Can also be used to log keystrokes and
send those to whomever
WHAT IS SPYWARE ?
 Software that is installed on a computer without the
user’s knowledge which monitors user activity and
transmits it to another computer. Many spyware
programs are set to monitor what web sites you
visit them generally for advertising /marketing
purposes.
 Software or hardware installed on a
computer without the user's knowledge
which gathers information about that
user for later retrieval by whomever
controls the spyware.
 Spyware can be broken down into two
different categories:
 surveillance spyware
 advertising spyware.
 Spyware oriented in the 1990’s with programs that
secretly observed and logged user web surfing
habits. It can do more than steal your personal
information but also job user PC of its speeds,
stability and Internet acess efficiency
CLASS OF SPYWARE
TRACKING COOKIES
 Cookies that can track your Web
activities
 May include cookies that contain
user names
passwords
other private information that you
enter on web sites (SSN, banking
info, credit cards)
BROWSER HIJACKING
 Hosts File
Redefine the addresses of trusted
sources, i.e. anti-virus tools, software
patches and upgrades
 Home Page
Redefine the page that opens up when
you start your browser
BROWSER HIJACKING
 Search Page
Redefine the page that opens up when
you enter an undefined URL
Redefine the page that opens up when
you click your “Search” button
 Error Pages
Redefine the pages that open when an
error occurs.
KEYLOGGERS
 Were originally designed to record all
keystrokes of users in order to find
passwords, credit card numbers, and
other sensitive information
SPYBOTS
 Spybots are the prototypical example of
“spyware.” A spybot monitors a user’s
behavior, collecting logs of activity and
transmitting them to third parties.
 A spybot may be installed as a browser
helper object, it may exist as a DLL on
the host computer, or it may run as a
separate process launched whenever the
host OS boots.
MALWARE & ADWARE
 Malware
Refers to a variety of malicious
software, including viruses, worms,
Trojan horses.
 Adware
Software that displays advertisements
tuned to the user’s current activity,
potentially reporting aggregate or
anonymized browsing behavior to a
third party
Spyware Vs Virus
1. Motivation Profit
2. Monitor online
activities for
commercial gain
3. Difficult to relate
symptoms with
spyware infection.
4. New technology
(less than 5 years)
1. Intent Harmful
2. Damage computer
system, corrupt files
and destroy data
3. Easy to relate
symptoms with virus
infection: Corrupt
program files, loss of
computer storage
memory, deletion of
critical files.
4. Old Technology
SPYWARE VS TROJAN
HORSE
 Spyware programs are sometimes
installed as Trojan horses of one sort or
another.They differ in that their creators
present themselves openly as businesses,
for instance by selling advertising space
on the pop-ups created by the malware.
Most such programs present the user
with an End-User License Agreement
which purportedly protects the creator
from prosecution under computer
contaminant laws. However, spyware
EULAs have not yet been upheld in
court.
SPAYWARE PREVALENCE
April 16, 2004; BBC News (UK) - PCs
'infested' with spy programs. Internet
provider EarthLink says it uncovered
29.5 million examples of spyware on
over 1 million computers scanned
between January and March. These
parasite programs sometimes come
attached to software downloaded from
the Web.
PRESERVATION OF SPYWARE
 Do not installed free software availble
on internet.
 Do not click on email attachments or
links of you don’t know the sender or
even if you send know the sender, but
the content is unexpected.
 Do not installed unknown software.
 Do not click on links or buttons or pop-
up windows.
THANKTHANK
YOUYOU

Más contenido relacionado

La actualidad más candente

Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Program security
Program securityProgram security
Program securityG Prachi
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIADheeraj Kataria
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTIONAnoop T
 

La actualidad más candente (20)

Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Program security
Program securityProgram security
Program security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Intruders
IntrudersIntruders
Intruders
 
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIAInformation Security- Threats and Attacks presentation by DHEERAJ KATARIA
Information Security- Threats and Attacks presentation by DHEERAJ KATARIA
 
Email security
Email securityEmail security
Email security
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
System security
System securitySystem security
System security
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 

Similar a Keyloggers and Spywares

Similar a Keyloggers and Spywares (20)

ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Spywares & Keyloggers
Spywares & KeyloggersSpywares & Keyloggers
Spywares & Keyloggers
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 

Último

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Último (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Keyloggers and Spywares

  • 1. PRESENT BY : Ankit Mistry (130280105026) KEY LOGGERSKEY LOGGERS && SPYWARESSPYWARES
  • 2. WHAT IS KEY LOGGER????  A key logger is a program that runs in the background or hardware, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker  Attacker checks files carefully in the hopes of either finding passwords, or possibly other useful information.
  • 3.  Key loggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only  Such systems are also highly useful for law enforcement and espionage  Keystroke logging can be achieved by both hardware and software means.
  • 4.  There are two types of keyloggers : 1. Hardware Keylogger 2. Software Keylogger
  • 5. HARDWARE KEYLOGGER  Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords.  Generally, recorded data is retrieved by typing a special password into a computer text editor.  The hardware keyloggers plugged in between the keyboard and computer detects that the password has been typed and then presents the computer with "typed" data to produce a menu.
  • 6.
  • 7. HARDWARE KEYLOGGERS Come in three types:  Inline devices that are attached to the keyboard cable.  Devices which can be installed inside standard keyboards.  Replacement keyboards that contain the key logger already built-in.
  • 8. SOME HARDWARE KEYLOGGERS  Hardware KeyLogger Stand-alone Edition a tiny hardware device that can be attached in between a keyboard and a computer.  Hardware KeyLogger Keyboard Edition looks and behaves exactly like a normal keyboard, but it keeps a record of all keystrokes typed on it.  KeyGhost Hardware Keylogger a tiny hardware device that can be attached in between a keyboard and a computer.  KeyKatcher Keystroke Logger a tiny hardware device that can be attached in between a keyboard and a computer.
  • 9.  Advantages : 1. Antivirus techniques cannot catch these. 2. Work on all computing platforms.  Disadvantages : 1. It can be spotted by a suspicious user.
  • 10. SOFTWARE KEYLOGGERS  Software keyloggers track system , collect keystoke data within the target operating system , store them on disk or in remote location , and send them to the attacker who installed the keyloggers.  Anti malware, personal firewall, and Host-based Intrusion prevention(HIPS) solution detect and remove application keyloggers.
  • 11. Software keylogger detection methods include: Scan local drive for log.txt or other log file names associate with known keyloggers. Implement solution that detect unauthorized file transfer via FTP or other protocols; Scan content sent via email or other authorized means looking for sensitive information; Detect encrypted files transmitted to questionable destinations.
  • 12. Advantages : 1.Are hard to detect 2.Can be deployed remotely via a software vulnerability attack 3.Are fairly easy to write Disadvantage : 1.A good antivirus scheme could sniff these out. 2.Far fewer cons with the software, so these are much more common than hardware-type keyloggers.
  • 13. EXAMPLE OF WINDOWS KEYLOGGERS  Badtrans : a keylogger worm that exploited vulnerability in outlook express and internet explorer. It collect keystrokes and them to various e mail address.  Magic lantern: FBI’s own software to wire tap|log email passing through ISPs.
  • 14. What Is Spyware ?  Applications that send information from your computer to the creator of the spyware  Sometimes consists of an apparent core functionality and a hidden functionality of information gathering (Trojan)  Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends  Can also be used to log keystrokes and send those to whomever
  • 15. WHAT IS SPYWARE ?  Software that is installed on a computer without the user’s knowledge which monitors user activity and transmits it to another computer. Many spyware programs are set to monitor what web sites you visit them generally for advertising /marketing purposes.
  • 16.  Software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware.  Spyware can be broken down into two different categories:  surveillance spyware  advertising spyware.
  • 17.  Spyware oriented in the 1990’s with programs that secretly observed and logged user web surfing habits. It can do more than steal your personal information but also job user PC of its speeds, stability and Internet acess efficiency
  • 19. TRACKING COOKIES  Cookies that can track your Web activities  May include cookies that contain user names passwords other private information that you enter on web sites (SSN, banking info, credit cards)
  • 20. BROWSER HIJACKING  Hosts File Redefine the addresses of trusted sources, i.e. anti-virus tools, software patches and upgrades  Home Page Redefine the page that opens up when you start your browser
  • 21. BROWSER HIJACKING  Search Page Redefine the page that opens up when you enter an undefined URL Redefine the page that opens up when you click your “Search” button  Error Pages Redefine the pages that open when an error occurs.
  • 22. KEYLOGGERS  Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information
  • 23. SPYBOTS  Spybots are the prototypical example of “spyware.” A spybot monitors a user’s behavior, collecting logs of activity and transmitting them to third parties.  A spybot may be installed as a browser helper object, it may exist as a DLL on the host computer, or it may run as a separate process launched whenever the host OS boots.
  • 24. MALWARE & ADWARE  Malware Refers to a variety of malicious software, including viruses, worms, Trojan horses.  Adware Software that displays advertisements tuned to the user’s current activity, potentially reporting aggregate or anonymized browsing behavior to a third party
  • 25. Spyware Vs Virus 1. Motivation Profit 2. Monitor online activities for commercial gain 3. Difficult to relate symptoms with spyware infection. 4. New technology (less than 5 years) 1. Intent Harmful 2. Damage computer system, corrupt files and destroy data 3. Easy to relate symptoms with virus infection: Corrupt program files, loss of computer storage memory, deletion of critical files. 4. Old Technology
  • 26. SPYWARE VS TROJAN HORSE  Spyware programs are sometimes installed as Trojan horses of one sort or another.They differ in that their creators present themselves openly as businesses, for instance by selling advertising space on the pop-ups created by the malware. Most such programs present the user with an End-User License Agreement which purportedly protects the creator from prosecution under computer contaminant laws. However, spyware EULAs have not yet been upheld in court.
  • 27. SPAYWARE PREVALENCE April 16, 2004; BBC News (UK) - PCs 'infested' with spy programs. Internet provider EarthLink says it uncovered 29.5 million examples of spyware on over 1 million computers scanned between January and March. These parasite programs sometimes come attached to software downloaded from the Web.
  • 28. PRESERVATION OF SPYWARE  Do not installed free software availble on internet.  Do not click on email attachments or links of you don’t know the sender or even if you send know the sender, but the content is unexpected.  Do not installed unknown software.  Do not click on links or buttons or pop- up windows.