demo

11
NETWORK SECURITY CLASS AEP 06 NGUYEN VAN HOANG – 11520564 TRAN MINH TRI - 10520452 University of Information Technology Teacher: NGUYEN TUAN NAM

Upload: viruskyo

Post on 18-Aug-2015

10 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Demo

NETWORK SECURITY

CLASS AEP 06

NGUYEN VAN HOANG – 11520564

TRAN MINH TRI - 10520452

University of Information Technology

Teacher: NGUYEN TUAN NAM

Page 2: Demo

Demo keylogger

Page 3: Demo

Introduction

Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge

Spyware is mostly used for the purposes such as: tracking and storing internet users' movements on the web; gathering info …

Page 4: Demo

Introduction

“Spyware” is mostly classified into four types: system monitors/keyloggers, trojans, adware, and tracking cookies

Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users

Page 5: Demo

Introduction

Keylogger is the program that is the action of recording (or logging) the keys use on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. Nowaday, when keylogger has been developed at high level. It can record all images, which is displayed in the screen by screen-shot or screen-capture, even they can record the movement of mouse pointer

Page 6: Demo

Introduction

External Keyloggers (hardware)Hardware based keyloggers use physical tools, either attached to the computer or designed to look like part of the computer, to covertly record actions taken by computer users.

When the person who places the keylogger is ready to retrieve the information recorded, he or she will have to remove the keylogger, like a memory card, and download the information to their computer, where the log of struck keys can be viewed

Page 7: Demo
Page 8: Demo

Introduction

Internal Keyloggers (software)Software based keyloggers use digital code to capture and record the keystrokes made on a computer without use of physical hardware

The keylogging program is installed on the computer to be monitored like other programs; either from a CD-ROM or downloaded directly from the internet.

Once installed, the application’s files are hidden deep in a computer’s system so that the casual computer user will never notice them; and they run without displaying any signs to the computer user that a covert program is running in the background

Page 9: Demo

Parts of Keyloggers

Typically, a keylogger program will consist of three main parts:

Control Program: used to coordinate activities, tweak the settings, see the log file for Keylogger. This section is the most technical part of the hidden keylogger, usually only able to call by using a special keystroke combinations.

Hook file, or as a monitor program to record your keystrokes, capture screen (this is the most important part).

Log file, which full contains / record of what was recorded by hook

Page 10: Demo

Demo Keylogger

Page 11: Demo

Note

“Spyware” is mostly classified into four types: system monitors/keyloggers, trojans, adware, and tracking cookies

System monitors/keyloggers render serious privacy risks because they secretly capture and transmit user's personal information, worse still, passwords used in online transactions

Trojans can be used to obtain sensitive information, install malicious programs, hijack the computer, or compromise additional computers or networks

Adware tracks the users' online activities on the internet to deliver targeted pop-up advertisements

Tracking cookies are the uninformed small text files downloaded to a user's computer that preserves preferences on specific websites