Key loggers definition
Keyloggers is a software program or hardware device that is used to
monitor and log each of the keys a user types in to a computer keyboard.
The user who installed the program or hardware device can then view all
keys typed in by that user. Because this programs and hardware devices monitor
the keys typed in user can easily find user password and other information a
user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure
employers use work computers for business purposes only.
Unfortunately, key loggers can also be embedded in spyware allowing your
information to be transmitted to an unknown third party.
About keyloggers
A keylogger is a program that’s runs in the background, recording all the
keystrokes.
Once keystrokes are logged, they are hidden in the machine for later retrieval,
or shipped raw to the attacker. The attacker then peruses then carefully in the
hopes of either finding passwords, or possibly other useful information that
could be used to compromise the system or be used in a social engineering
attack. For example, a keylogger will reveal the contents of all e-mail
composed by the user. Keylogger is commonly included in rootkits.
A keylogger normally consists of two files: a DLL which does all the work
and an EXE which loads the DLL and sets the hook. Therefore when you deploy the
hooker on a system, two such files must be presented in the same directory.
There are other approaches to
capturing info about what you are doing.
·
Some
keyloggers capture screens, rather than keystokes.
·
Other
keyloggers will secretly trun on video or audio recorders, and transmit what
they capture over your internet connection.
Akeyloggers might be as an exe and a dll that
are placed on a machine and invoked at boot via an entry in the registry. Or a
keyloggers could be which boastes this features
·
Stealth
“invisible in process list
·
Includes
kernel keylogger driver that captures keystrokes even when user is logged
of(windows 2000 / XP)
·
ProBot
program files and registry entries are hidden( windows 2000 / XP)
·
Includes
remote deployment wizard
·
Active
window titles and process names logging
·
Keystrokes
/ password logging
·
Regional
keyboard support
·
Keylogging
in NT console windows
·
Launched
applications list
·
Text
snapshots of active applications
·
Visited
internet URL logger
·
Capture
HTTP post data ( including logins / passwords)
·
File
and folder creations / removal logging
·
Mouse
activities
·
Workstation user and timestamp recording
·
Log
file archiving, separate log files for each user
·
Log
files secure encryption
·
Password
authentication
·
Invisible
operation
·
Native
GUI session log presentation
·
Easy log file reports with instant viewer 2
web interface
·
HTML
and text log file export
·
Automatic
email log file delivery
·
Easy
setup and install wizard
·
Support
for windows (R) 95/98/ME and windows (R) NT/2000/XP
Because a keylogger can involves
dozens of files, and has as a primary goal complete stealth from the user,
removing one manually can be terrifying challenge any computer user. Incorrect removal
effort can result in damage to the operating system, instability, inability to
use the mouse or keyboard, or worse. Further, some keyloggers will survive
manual efforts to remove them, reinstalling them self before the user even
reboots.
Some Famous
key loggers.
1.
Actual
spy.
“You can download actual spy from here: http://u.to/tCWk”.
2.
Golden
keylogger
“You can download golden keylogger from here: http://u.to/0iWk”.
3.
Remote
key logger
“You can download remote keylogger from here: http://u.to/3iWk”.
.jpg)
No comments:
Post a Comment