SlideShare une entreprise Scribd logo
1  sur  16

 Introduction
 Why?
 Types
 Detection and Preventaion
 How Keylogger protect Itself from user?
Today We’ll discuss

 Tools used for monitoring and Capturing key stroke
pressed on Key board.
 person using the keyboard is unaware that their
actions are being monitored.
 One of the Type Of Spyware .
Key Logger
Introduction
 To monitor the User’s Activity.
 To monitor child Activity in the absence of their parents.
 To see the Employee’s performance in Corporation
 To Backup data from accidental Loss.
 To steal the sensitive information
Like
username, Password, credit card no. , pin code ……
Why?

 Software Based Key Logger
 Hardware Based Key Logger
Types

Hypervisor-based: As virtual Machine
e.g. Blue Pills
Kernel-based:difficult to write and detect
e.g. Device Driver
API-based: Easy to write and easy to kill
e.g. Getasynckeystate() function
Form grabbing based :log web form submissions by
recording the web browsing onsubmit event
functions before encryption
Software Based Key Logger
 Data is uploaded to a website, database or an FTP server.
 Data is periodically emailed to a pre-defined email address.
 Data is wirelessly transmitted by means of an attached
hardware system.
 The software enables a remote login to the local machine
from the Internet or the local network, for data logs stored on
the target machine to be accessed.
 Clipboard logging
 Screen Logging
Some Extra features

 Keyboard hardware
 Wireless keyboard sniffers:
 Keyboard overlays (Double Layered )
 Acoustic keyloggers(Mobile Kepad Tone )
 Optical surveillance(CC Camera,Spy camera)
Hardware Based
Keylogger

 This method is very popular stealing ATM machine
PIN.
Keyboard OverLay

Optical surveillance
(Spy Camera)

 It is Like a pendrive which is invisible on computer.
 Press hot key to make it visible.
 There are large no of report Files,just open and see the
Reports.
Hardware Keylogger
Report reading Process
 Hiding process on Task Manager.
 Giving False Name like
rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e
xe
Running Mutual Monitoring Process side by side.
Writing Driver which prevent it from killing.
Calling dll file using rundll32.exe
Keylogger uses Hot Key and password to protect
their Data.
e.g.
HotKey :- Shift+Alt+S
How Keyloggers protect
Itself from user?
 Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot
 Enable “Image Path Name” of Task Manager On windows
 Check startup application , msconfig.exe
 Clear Browser’s cookies after using public Computer.
 Use Live CD while using other’s Computer.
 Use On-screen Keyboard while entering password.
 Use different Keyboard Layout.
 Use Smart Card .
Detection And Prevention

 Use Speech to Text Services.
 Use Hand writing recognition Tools.
 Type Password randomly
if Your password is a1b2c3d4
then first type 1234 & then click at first position enter a
similar click on other proper position and enter
corresponding
letter ,then Key logger logs seems to be
[click]a[click]b[click]c[click]d
Detection And Prevention

Screen Shot of Enabling Image Path
Name

Be Safe
Be Happy 
Thank You

Contenu connexe

Tendances

Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

Tendances (20)

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Spyware
SpywareSpyware
Spyware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
spyware
spywarespyware
spyware
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
System hacking
System hackingSystem hacking
System hacking
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)
 
Spyware
SpywareSpyware
Spyware
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
malware analysis
malware  analysismalware  analysis
malware analysis
 
Rootkits
RootkitsRootkits
Rootkits
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
spyware
spywarespyware
spyware
 

Similaire à Key logger,Why? and How to prevent Them?

Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collector
wncstudent1
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
bora.gungoren
 

Similaire à Key logger,Why? and How to prevent Them? (20)

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collector
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Power of logs: practices for network security
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network security
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
 
43 automatic
43 automatic43 automatic
43 automatic
 
Aiman
AimanAiman
Aiman
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Demo
DemoDemo
Demo
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit Giri
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
Antikeylogger
AntikeyloggerAntikeylogger
Antikeylogger
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 

Dernier

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Key logger,Why? and How to prevent Them?

  • 1.
  • 2.   Introduction  Why?  Types  Detection and Preventaion  How Keylogger protect Itself from user? Today We’ll discuss
  • 3.   Tools used for monitoring and Capturing key stroke pressed on Key board.  person using the keyboard is unaware that their actions are being monitored.  One of the Type Of Spyware . Key Logger Introduction
  • 4.  To monitor the User’s Activity.  To monitor child Activity in the absence of their parents.  To see the Employee’s performance in Corporation  To Backup data from accidental Loss.  To steal the sensitive information Like username, Password, credit card no. , pin code …… Why?
  • 5.   Software Based Key Logger  Hardware Based Key Logger Types
  • 6.  Hypervisor-based: As virtual Machine e.g. Blue Pills Kernel-based:difficult to write and detect e.g. Device Driver API-based: Easy to write and easy to kill e.g. Getasynckeystate() function Form grabbing based :log web form submissions by recording the web browsing onsubmit event functions before encryption Software Based Key Logger
  • 7.  Data is uploaded to a website, database or an FTP server.  Data is periodically emailed to a pre-defined email address.  Data is wirelessly transmitted by means of an attached hardware system.  The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.  Clipboard logging  Screen Logging Some Extra features
  • 8.   Keyboard hardware  Wireless keyboard sniffers:  Keyboard overlays (Double Layered )  Acoustic keyloggers(Mobile Kepad Tone )  Optical surveillance(CC Camera,Spy camera) Hardware Based Keylogger
  • 9.   This method is very popular stealing ATM machine PIN. Keyboard OverLay
  • 11.   It is Like a pendrive which is invisible on computer.  Press hot key to make it visible.  There are large no of report Files,just open and see the Reports. Hardware Keylogger Report reading Process
  • 12.  Hiding process on Task Manager.  Giving False Name like rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e xe Running Mutual Monitoring Process side by side. Writing Driver which prevent it from killing. Calling dll file using rundll32.exe Keylogger uses Hot Key and password to protect their Data. e.g. HotKey :- Shift+Alt+S How Keyloggers protect Itself from user?
  • 13.  Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot  Enable “Image Path Name” of Task Manager On windows  Check startup application , msconfig.exe  Clear Browser’s cookies after using public Computer.  Use Live CD while using other’s Computer.  Use On-screen Keyboard while entering password.  Use different Keyboard Layout.  Use Smart Card . Detection And Prevention
  • 14.   Use Speech to Text Services.  Use Hand writing recognition Tools.  Type Password randomly if Your password is a1b2c3d4 then first type 1234 & then click at first position enter a similar click on other proper position and enter corresponding letter ,then Key logger logs seems to be [click]a[click]b[click]c[click]d Detection And Prevention
  • 15.  Screen Shot of Enabling Image Path Name
  • 16.  Be Safe Be Happy  Thank You