dr. ajay nagne 1 keylogger · 2020. 12. 9. · dr. ajay nagne 18. interacting with keylogger...

27
KEYLOGGER 1 Dr. Ajay Nagne

Upload: others

Post on 30-Jan-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • KEYLOGGER1Dr. Ajay Nagne

  • Table of Contents2

    Introduction

    Background and Description

    Acceptable uses:

    Malicious uses:

    Types of Key loggers

    Hardware

    SoftwareDr. Ajay Nagne

  • Introduction

    Keylogger is a computer program that recordsevery keystroke made by a computer user, togain fraudulent access to passwords and otherconfidential information.

    Keylogging is also known as Keystroke logging.

    It can also be used to study human–computerinteraction.

    There are two basic purpose to use Keyloggers.

    To monitor employee performance

    To access confidential information

    3

    Dr. Ajay Nagne

  • What is keystroke logging?

    Key loggers, as a surveillance tool, areoften used by employers to ensureemployees use work computers forbusiness purposes only

    Such systems are also highly usefulfor law enforcement and espionageKeystroke logging can be achieved byboth hardware and software means.

    Dr. Ajay Nagne

    4

  • Introduction5

    Keystroke logging, also known as keylogging, is simplytracking the keys that are struck on a keyboard. Thiscan be done in multiple ways using a wide variety ofhardware devices or software.

    The reason for its large threat to networks and theirsecurity is due to its covertness nature.

    Most keyloggers show no signs of any intrusion withinthe system allowing for them to gain typedinformation without anyone having knowledge of itsactions except for the user who installed it.

    Dr. Ajay Nagne

  • Introduction6

    With the proper keylogger installed on the correctmachine a person could easily gain access to acompany’s entire network infrastructure.

    In terms of system critical data or extremelyprivileged information this could cause problems fora vast amount of people very quickly.

    Throughout the remainder of this paper I willcontinue to give a background description ofkeyloggers, provide you with methods for usingthem, compare different types of keyloggers, andanalyze any issues that may arise from keyloggerusage. Dr. Ajay Nagne

  • Keystroke Loggers

    Keystroke loggers

    Monitor and record keystrokes

    Can be software or hardware devices

    Sometimes used by companies to track employees’ use of e-mail and the Internet

    Can be used for malicious purposes

    Some antivirus and antispyware programs protect against software keystroke loggers

    Dr. Ajay Nagne

    7

  • Background and Description:8

    The only thing we can know for sure is that we willnever know an exact date or an exact person topinpoint the invention of keyloggers on.

    They have existed and have been used for many years. Keyloggers first appeared on the scene in the late 80’s

    and early 90’s. One of the earliest keyloggers waswriting by a man named Perry Kivolowitz.

    He posted his source code to net.unix-wizards,net.sources on November 17, 1983.

    The program basically operated by locating characterlists, or clists, as they were being built by the Unixkernel.

    Dr. Ajay Nagne

  • Background and Description:9

    Keyloggers have a wide variety of uses and can beeither hardware-based or software-based. Themain purpose is to log everything that is typed ona keyboard and store it in text files for laterassessment.

    Everything that is typed will be logged; thisincludes sensitive information such as passwords,names, pin numbers, and even credit cardnumbers.

    While keyloggers have many acceptable uses theyalso have many malicious uses.

    Dr. Ajay Nagne

  • Acceptable uses:10

    Parent monitoring child’s computer usage

    Boss monitoring employee’s computerusage

    Government retrieving informationpertinent to a crime

    Dr. Ajay Nagne

  • Malicious uses:11

    Cracking passwords

    Gaining unauthorized information

    Stealing credit card numbers

    Reading sent emails or messages not intended for public viewing

    Retrieving secret names

    Stealing account numbersDr. Ajay Nagne

  • Types of Keyloggers

    There are different types of Keyloggersdivided into two main groups. Hardware Keyloggers

    Software Keyloggers

    Dr. Ajay Nagne

    12

  • Hardware Keyloggers

    Hardware Keyloggers are small electronic devices used forcapturing the data in between a keyboard device and I/Oport.

    Usually these devices have built in memory where theystore the keystrokes so this means they must be retrievedby the person who installed it in order to obtain theinformation.

    Hardware Keyloggers are undetectable by anti-viralsoftware or scanners since it works on the hardwareplatform

    13

    Dr. Ajay Nagne

  • Hardware key loggers

    Come in three types:

    Inline devices that are attached to the keyboard cable

    Devices which can be installed inside standard keyboards

    Replacement keyboards that contain the key logger already built-in

    Dr. Ajay Nagne

    14

  • Some hardware keyloggers

    Hardware KeyLogger Stand-alone Edition a tiny hardware device that can be attached in between a keyboard and a computer.

    Hardware KeyLogger Keyboard Edition looks and behaves exactly like a normal keyboard, but it keeps a record of all keystrokes typed on it.

    KeyGhost Hardware Keyloggera tiny hardware device that can be attached in between a keyboard and a computer.

    KeyKatcher Keystroke Logger a tiny hardware device that can be attached in between a keyboard and a computer.

    Dr. Ajay Nagne

    15

    http://www.amecisco.com/hkstandalone.htmhttp://www.amecisco.com/hkkeyboard.htmhttp://www.keyghost.com/http://keystroke-loggers.staticusers.net/

  • Keylogger

    The Hardware KeyLogger™ Stand-aloneEdition is a tiny hardware device that can beattached in between a keyboard and acomputer.

    It keeps a record of all keystrokes typed on thekeyboard. The recording process is totallytransparent to the end user. BEFORE AFTER

    • The keystrokes canonly be retrieved by anadministrator with aproper password. Dr. Ajay Nagne

    16

  • Hardware KeyLoggerTMKeyboard Edition

    The Hardware KeyLogger™ Keyboard Edition looks and behaves exactly like a normal keyborad, but it keeps a record of all keystrokes typed on it. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password.

    Dr. Ajay Nagne

    17

  • KeyKatcher

    The KeyKatcher is a hardware device to log activity as it is performed on the keyboard. The device works with any PS/2 keyboard and is not dependant on the operating system because there is not any software required for the manufacture to product to interact with the hardware.

    The KeyKatcher records up to 32,000 bytes (keystrokes) in the 33k model or 64,000 bytes (key strokes) in the 64k model. Even if the device is unplugged from the keyboard it will still remember EVERYTHING and you wont lose a single keystroke.

    Dr. Ajay Nagne

    18

  • Interacting with keylogger

    Interacting with the Keystroke logger is simple, it can be done from any PS/2 compatible keyboard/computer. You can take it off the computer it is on to examine the data on another computer or perform the audit from that computer. Enter into a text program. Type the passphrase which was set, the menu will be displayed, you can navigate through the menus by entering typing in the number

    corresponding with the command.

    Dr. Ajay Nagne

    19

  • Other approaches

    There are other approaches to capturing info about what you are doing.

    Some keyloggers capture screens, rather than keystrokes.

    Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

    Dr. Ajay Nagne

    20

  • Software Key Logging

    Easy to implement – code is relatively normal.

    Hard to install – user can notice the presence of it.

    Dr. Ajay Nagne

    21

  • Problems with installing a Key Logger

    An attacker that connects to the target to download the keystrokes risks being traced.

    A code that sends the information to an email address risks exposing the attacker.

    Dr. Ajay Nagne

    22

  • Secure ways to install a key logger

    Program can be distributed through viruses and/or worms and attacker can claim to victim of it if s/he is caught.

    Use cryptography to prevent others from discovering the content and later decode it later.

    Dr. Ajay Nagne

    23

  • Examples of key loggers

    Magic Lantern

    developed by the FBI

    is installed remotely via email attachment.

    All in One Keylogger Spy Software

    sends encrypted logs to desired email

    tracks all users activity

    Dr. Ajay Nagne

    24

  • Examples of key loggers (cont.)

    Wiretap Pro

    specializes in Internet monitoring

    records chats, emails, web sites visited

    Ardamax Keylogger

    monitors user activity in an encrypted way

    data is stored as text or web page

    used to maintain backups or monitor kids.

    Dr. Ajay Nagne

    25

  • Defending from a key logger

    Have our computer up to date with: Keep net firewall on

    Anti-spywares

    Anti-viruses

    Check USB ports and PS/2

    Check programs installed

    Also we can maintain a practice of using only the soft keyboard (on screen). However is not completely secure.

    Dr. Ajay Nagne

    26

  • 27

    Thank You . . . . . !

    Dr. Ajay Nagne