demo
TRANSCRIPT
NETWORK SECURITY
CLASS AEP 06
NGUYEN VAN HOANG – 11520564
TRAN MINH TRI - 10520452
University of Information Technology
Teacher: NGUYEN TUAN NAM
Demo keylogger
Introduction
Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge
Spyware is mostly used for the purposes such as: tracking and storing internet users' movements on the web; gathering info …
Introduction
“Spyware” is mostly classified into four types: system monitors/keyloggers, trojans, adware, and tracking cookies
Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users
Introduction
Keylogger is the program that is the action of recording (or logging) the keys use on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. Nowaday, when keylogger has been developed at high level. It can record all images, which is displayed in the screen by screen-shot or screen-capture, even they can record the movement of mouse pointer
Introduction
External Keyloggers (hardware)Hardware based keyloggers use physical tools, either attached to the computer or designed to look like part of the computer, to covertly record actions taken by computer users.
When the person who places the keylogger is ready to retrieve the information recorded, he or she will have to remove the keylogger, like a memory card, and download the information to their computer, where the log of struck keys can be viewed
Introduction
Internal Keyloggers (software)Software based keyloggers use digital code to capture and record the keystrokes made on a computer without use of physical hardware
The keylogging program is installed on the computer to be monitored like other programs; either from a CD-ROM or downloaded directly from the internet.
Once installed, the application’s files are hidden deep in a computer’s system so that the casual computer user will never notice them; and they run without displaying any signs to the computer user that a covert program is running in the background
Parts of Keyloggers
Typically, a keylogger program will consist of three main parts:
Control Program: used to coordinate activities, tweak the settings, see the log file for Keylogger. This section is the most technical part of the hidden keylogger, usually only able to call by using a special keystroke combinations.
Hook file, or as a monitor program to record your keystrokes, capture screen (this is the most important part).
Log file, which full contains / record of what was recorded by hook
Demo Keylogger
Note
“Spyware” is mostly classified into four types: system monitors/keyloggers, trojans, adware, and tracking cookies
System monitors/keyloggers render serious privacy risks because they secretly capture and transmit user's personal information, worse still, passwords used in online transactions
Trojans can be used to obtain sensitive information, install malicious programs, hijack the computer, or compromise additional computers or networks
Adware tracks the users' online activities on the internet to deliver targeted pop-up advertisements
Tracking cookies are the uninformed small text files downloaded to a user's computer that preserves preferences on specific websites