Keyloggers - PowerPoint PPT Presentation

About This Presentation
Title:

Keyloggers

Description:

Network security – PowerPoint PPT presentation

Number of Views:8902
Slides: 15
Provided by: Username withheld or not provided
Tags:

less

Transcript and Presenter's Notes

Title: Keyloggers


1
Subject Network Security Topic Keylogge
rs Working and Types
  • Presented to Assistant Professor Inam Ul Haq
  • Presented by Muhammad Faizan Butt (1043)

2
Contents
  • What is Keyloggers
  • Groups of Keyloggers
  • How does Keylogger work
  • Preventions
  • Conclusion
  • References

3
What is Keylogger
  • Keylogger is a computer program that records
    every keystroke made by a computer user, to gain
    fraudulent access to passwords and other
    confidential information.
  • Keylogging is also known as Keystroke logging.
  • It can also be used to study humancomputer
    interaction. 
  • There are two basic purpose to use Keyloggers.
  • To monitor employee performance
  • To access confidential information

4
Types of Keyloggers
  • There are different types of Keyloggers divided
    into two main groups.
  • Hardware Keyloggers
  • Software Keyloggers

5
Hardware Keyloggers
  • Hardware Keyloggers are small electronic devices
    used for capturing the data in between a keyboard
    device and I/O port.
  • Usually these devices have built in memory where
    they store the keystrokes so this means they must
    be retrieved by the person who installed it in
    order to obtain the information.
  • Hardware Keyloggers are undetectable by
    anti-viral software or scanners since it works on
    the hardware platform

6
Types of Hardware Keyloggers
  • Hardware Keylogger Stand-alone Edition
  • It is a tiny hardware device that can be attached
    in between keyboard and a computer.
  • Hardware Keylogger Keyboard Edition
  • It looks and behaves exactly like a normal
    keyboard, but it keeps a record of all keystrokes
    typed on it.
  • KeyKatcher Keystroke Logger
  • It is a tiny hardware device that can be attached
    in between a keyboard and a computer.

7
Hardware Keylogger Stand-alone Edition
  • It is a tiny hardware device that can be attached
    in between a keyboard and a computer. It keeps a
    record of all keystrokes typed.

8
Hardware Keylogger Keyboard Edition
  • It keeps a record of all keystrokes typed on it.
    The recording process is totally transparent to
    the end user. The keystrokes can only be
    retrieved by an administrator with a proper
    password.

9
KeyKatcher Keystroke Logger
  • The KeyKatcher records up to 32,000 bytes
    (keystrokes) in the 33k model or 64,000 bytes
    (key strokes) in the 64k model. Even if the
    device is unplugged from the keyboard it will
    still remember EVERYTHING and you wont lose a
    single keystroke.

10
Software Keyloggers
  • Software Keyloggers track systems, collect
    keystroke data within the target operating
    system, store them on disk or in remote
    locations, and send them to the attacker.
  • They can run for an indefinite amount of time
    while the info is being transmitted remotely.
  • There are three ways to install the Keylogger
    software.
  • Install it from a compact disc or floppy disk.
  • As a computer virus or Trojan horse.
  • Gain access to the computer over a network and
    install surveillance software remotely.

11
Hooker Keylogger
  • Hooker is a Keylogger software used for
    surveillance the activities in a computer.

12
Preventions
  • There are several ways to prevent Keyloggers
  • Anti-Virus/Spyware Firewalls (which?)
  • Automatic Form Fillers (Name?)
  • Alternative Keyboard Layouts
  • On screen Keyboards

13
Conclusion
  • As there are always two sides of a coin. Just
    like this Keylogger has good as well as bad
    reputation.
  • In the world of hacking it used to steal
    someones personal information. While on the
    other hand it is used in a company to monitor any
    suspicious activity that may cause a serious
    liability to the companys benefit.
  • But we must aware of whats installed on your
    computer. Use caution when surfing the internet.
    Keep your computers security software updated.

14
References
  • https//www.keelog.com/
  • http//www.keyghost.com/
  • http//www.kmint21.com/keylogger/
  • https//en.wikipedia.org/wiki/Keystroke_loggingTr
    ojans
  • https//www.youtube.com/watch?v_lCDg2XzEsA
  • http//www.wikihow.com/Identify-and-Remove-Keylogg
    ing-Malware-from-Your-Windows-8-Computer
Write a Comment
User Comments (0)
About PowerShow.com