SlideShare uma empresa Scribd logo
1 de 16

 Introduction
 Why?
 Types
 Detection and Preventaion
 How Keylogger protect Itself from user?
Today We’ll discuss

 Tools used for monitoring and Capturing key stroke
pressed on Key board.
 person using the keyboard is unaware that their
actions are being monitored.
 One of the Type Of Spyware .
Key Logger
Introduction
 To monitor the User’s Activity.
 To monitor child Activity in the absence of their parents.
 To see the Employee’s performance in Corporation
 To Backup data from accidental Loss.
 To steal the sensitive information
Like
username, Password, credit card no. , pin code ……
Why?

 Software Based Key Logger
 Hardware Based Key Logger
Types

Hypervisor-based: As virtual Machine
e.g. Blue Pills
Kernel-based:difficult to write and detect
e.g. Device Driver
API-based: Easy to write and easy to kill
e.g. Getasynckeystate() function
Form grabbing based :log web form submissions by
recording the web browsing onsubmit event
functions before encryption
Software Based Key Logger
 Data is uploaded to a website, database or an FTP server.
 Data is periodically emailed to a pre-defined email address.
 Data is wirelessly transmitted by means of an attached
hardware system.
 The software enables a remote login to the local machine
from the Internet or the local network, for data logs stored on
the target machine to be accessed.
 Clipboard logging
 Screen Logging
Some Extra features

 Keyboard hardware
 Wireless keyboard sniffers:
 Keyboard overlays (Double Layered )
 Acoustic keyloggers(Mobile Kepad Tone )
 Optical surveillance(CC Camera,Spy camera)
Hardware Based
Keylogger

 This method is very popular stealing ATM machine
PIN.
Keyboard OverLay

Optical surveillance
(Spy Camera)

 It is Like a pendrive which is invisible on computer.
 Press hot key to make it visible.
 There are large no of report Files,just open and see the
Reports.
Hardware Keylogger
Report reading Process
 Hiding process on Task Manager.
 Giving False Name like
rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e
xe
Running Mutual Monitoring Process side by side.
Writing Driver which prevent it from killing.
Calling dll file using rundll32.exe
Keylogger uses Hot Key and password to protect
their Data.
e.g.
HotKey :- Shift+Alt+S
How Keyloggers protect
Itself from user?
 Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot
 Enable “Image Path Name” of Task Manager On windows
 Check startup application , msconfig.exe
 Clear Browser’s cookies after using public Computer.
 Use Live CD while using other’s Computer.
 Use On-screen Keyboard while entering password.
 Use different Keyboard Layout.
 Use Smart Card .
Detection And Prevention

 Use Speech to Text Services.
 Use Hand writing recognition Tools.
 Type Password randomly
if Your password is a1b2c3d4
then first type 1234 & then click at first position enter a
similar click on other proper position and enter
corresponding
letter ,then Key logger logs seems to be
[click]a[click]b[click]c[click]d
Detection And Prevention

Screen Shot of Enabling Image Path
Name

Be Safe
Be Happy 
Thank You

Mais conteúdo relacionado

Mais procurados

Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksIAEME Publication
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 

Mais procurados (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Spyware
SpywareSpyware
Spyware
 
spyware
spywarespyware
spyware
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacks
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
What is malware
What is malwareWhat is malware
What is malware
 
Ransomware
RansomwareRansomware
Ransomware
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Social engineering
Social engineering Social engineering
Social engineering
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Malware
MalwareMalware
Malware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Semelhante a Key logger,Why? and How to prevent Them?

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collectorwncstudent1
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidenceAnimesh Lochan
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriOWASP Delhi
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3qacaybagirovv
 

Semelhante a Key logger,Why? and How to prevent Them? (20)

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collector
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Power of logs: practices for network security
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network security
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
 
43 automatic
43 automatic43 automatic
43 automatic
 
Aiman
AimanAiman
Aiman
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Demo
DemoDemo
Demo
 
Pwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit GiriPwning Windows Mobile applications by Ankit Giri
Pwning Windows Mobile applications by Ankit Giri
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
Antikeylogger
AntikeyloggerAntikeylogger
Antikeylogger
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Key logger,Why? and How to prevent Them?

  • 1.
  • 2.   Introduction  Why?  Types  Detection and Preventaion  How Keylogger protect Itself from user? Today We’ll discuss
  • 3.   Tools used for monitoring and Capturing key stroke pressed on Key board.  person using the keyboard is unaware that their actions are being monitored.  One of the Type Of Spyware . Key Logger Introduction
  • 4.  To monitor the User’s Activity.  To monitor child Activity in the absence of their parents.  To see the Employee’s performance in Corporation  To Backup data from accidental Loss.  To steal the sensitive information Like username, Password, credit card no. , pin code …… Why?
  • 5.   Software Based Key Logger  Hardware Based Key Logger Types
  • 6.  Hypervisor-based: As virtual Machine e.g. Blue Pills Kernel-based:difficult to write and detect e.g. Device Driver API-based: Easy to write and easy to kill e.g. Getasynckeystate() function Form grabbing based :log web form submissions by recording the web browsing onsubmit event functions before encryption Software Based Key Logger
  • 7.  Data is uploaded to a website, database or an FTP server.  Data is periodically emailed to a pre-defined email address.  Data is wirelessly transmitted by means of an attached hardware system.  The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine to be accessed.  Clipboard logging  Screen Logging Some Extra features
  • 8.   Keyboard hardware  Wireless keyboard sniffers:  Keyboard overlays (Double Layered )  Acoustic keyloggers(Mobile Kepad Tone )  Optical surveillance(CC Camera,Spy camera) Hardware Based Keylogger
  • 9.   This method is very popular stealing ATM machine PIN. Keyboard OverLay
  • 11.   It is Like a pendrive which is invisible on computer.  Press hot key to make it visible.  There are large no of report Files,just open and see the Reports. Hardware Keylogger Report reading Process
  • 12.  Hiding process on Task Manager.  Giving False Name like rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.e xe Running Mutual Monitoring Process side by side. Writing Driver which prevent it from killing. Calling dll file using rundll32.exe Keylogger uses Hot Key and password to protect their Data. e.g. HotKey :- Shift+Alt+S How Keyloggers protect Itself from user?
  • 13.  Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot  Enable “Image Path Name” of Task Manager On windows  Check startup application , msconfig.exe  Clear Browser’s cookies after using public Computer.  Use Live CD while using other’s Computer.  Use On-screen Keyboard while entering password.  Use different Keyboard Layout.  Use Smart Card . Detection And Prevention
  • 14.   Use Speech to Text Services.  Use Hand writing recognition Tools.  Type Password randomly if Your password is a1b2c3d4 then first type 1234 & then click at first position enter a similar click on other proper position and enter corresponding letter ,then Key logger logs seems to be [click]a[click]b[click]c[click]d Detection And Prevention
  • 15.  Screen Shot of Enabling Image Path Name
  • 16.  Be Safe Be Happy  Thank You