odpd 0lfur :l)l · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq...

7
You can now view the keystrokes in real-time or download the log file. There are many more options, including having the log files automatically emailed to you. To learn how, download the complete guide at: http://keyllama.com/files/microwifi.pdf IF YOU HAVE PROBLEMS We can quickly and easily resolve nearly every problem. Before you return the device, please give our outstanding customer service a chance! Send an email to [email protected] and Doug Kerfoot, the owner of KeyLlama will personally get right back to you and fix your problem. Please remember to tell him what device you have (KeyLlama Micro WiFi) and briefly describe the problem (what specifically doesn’t work?). 1. Connect the keylogger between your USB keyboard and the PC. It starts in WiFi Access Point mode by default. 2. Connect to the AP001 WiFi network with your PC or smartphone. 3. Open any web browser and type 192.168.5.1 as the page name. ATTENTION: Installation of this device indicates your consent to the User Agreement. KeyLlama Micro WiFi Quick Start Guide

Upload: others

Post on 14-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

You can now view the keystrokes in real-time or download the log file. There are many more options, including having the log files automatically emailed to you. To learn how, download the complete guide at: http://keyllama.com/files/microwifi.pdf

IF YOU HAVE PROBLEMS

We can quickly and easily resolve nearly every problem. Before you return the device, please give our outstanding customer service a chance! Send an email to [email protected] and Doug Kerfoot, the owner of KeyLlama will personally get right back to you and fix your problem. Please remember to tell him what device you have (KeyLlama Micro WiFi) and briefly describe the problem (what specifically doesn’t work?).

1. Connect the keylogger between your USB keyboard and the PC. It starts in WiFi Access Point mode by default.

2. Connect to the AP001 WiFi network with your PC or smartphone.

3. Open any web browser and type 192.168.5.1 as the page name.

ATTENTION: Installation of this device indicates your consent to the User Agreement.

KeyLlama Micro WiFi Quick Start Guide

Page 2: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

Advanced Options

There are three available WiFi Modes:

Access Point: This is the default setting as described on the first page. For better security, please create a custom SSID name and password and select a security protocol (WPA-PSK/WPA2-PSK suggested for most users). The IP address is 192.168.5.1 Access Point Hidden: This is the same as Access Point mode but the SSID is hidden for better stealth. Warning – you must remember the name of the hidden SSID!

Page 3: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

WiFi client: In this mode, the keylogger connects to a wireless network and can access the internet to keep track of the time and to send log files via email or FTP. The setup for this mode is basically the same as for connecting a new phone or PC to your wireless network.

WiFi Network Name (SSID): Enter your wireless network’s SSID WiFi Network Password: Enter your wireless network’s password. WiFi Network Status: Shows the IP Address assigned to the keylogger and the WiFi signal strength (RSSI). RSSI must be better than -80dBm for a stable connection. i.e.: -60dBm is better than -80dBm Time Zone: This ensures that the time/date stamps are accurate. For use in the United States, use the following:

Eastern Time Zone: GMT -5:00 or -4:00 for daylight savings time. Central Time Zone: GMT -6:00/-5:00DST Mountain Time Zone: GMT -7:00/-6:00DST Pacific Time Zone: GMT -8:00/-7:00DST

FTP Client: How often to send FTP logs. Default is Disable. E-mail Client: How often to send e-mail logs. Default is Disable. WWW Password: This sets the password for the keylogger’s webpage. User Name is admin. If left blank, anyone can access the keylogger contents and settings. TIP: When changing from Access Point mode to WiFi Client mode the assigned IP address of the keylogger is not initially known. Please refresh the configuration page several times after you “Save Network Settings”. The logger will then display the assigned IP address in the WiFi Network Status field. Make a note of this and then reboot your WiFi Logger and connect to its new IP address (192.168.1.52 in our example picture) with web a browser.

Page 4: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

E-mail Client settings:

The WiFi logger can send periodic e-mail reports with the latest data. The report size may be selected from 1KB to 64KB (it’s recommended to keep the reports small) in 15 minute, 1 hour or 1 day frequency. All you need is to configure the recipient’s e-mail address and put your server details and e-mail account login and password.

TIP: the first e-mail will be sent 5 seconds after saving your E-mail settings. This will help you confirm the the settings are OK and Internet connection is active. Send E-Mail to: Your email address. i.e: [email protected] Subject: Whatever you want the subject line to be E-mail Report max size: Suggest start with 8KB and adjust as needed. SMTP Server Name: For example: smtp.gmail.com SMTP Server Port: Most commonly 465 or 587. SMTP User: The username for the email server. i.e.: [email protected] SMTP Password: The password for the email server. i.e.: Your gmail password if using gmail. TIP: The “Send E-Mail to” and “SMTP User” lines are often the same.

Page 5: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

Using Gmail with the WiFi Logger Gmail made a recent change that requires one additional setting to allow the WiFi logger to send email using their servers. First, login to gmail. Then enter this into your browser address bar: https://myaccount.google.com/lesssecureapps Turn on Allow less secure apps:

FTP backup option

The WiFi logger can upload periodic reports to an FTP server. The report size may be selected from 1KB to 64KB. Enter the FTP server, port, user and file name and save the settings. The data backup frequency may be set for 15 minutes, 1 hour or 1 day in the WiFi client settings section (it’s disabled by default).

Page 6: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

USB Flash Drive Mode Access You can also access the recorded data using USB Flash Drive Mode, the same method used with traditional KeyLlama keyloggers. Plug the device in-between a USB keyboard and PC, and press the 3-key combination simultaneously (by default K, B, S) The keyboard will stop typing when the keylogger enters Flash Drive Mode. The keylogger will appear as a removable drive, containing the file LOG.TXT. This file will contain all recorded keystroke data. Reset Procedure In normal use, you should never have to do this, but if you forget your hidden SSID or your password, or have other trouble, this will restore the device to the factory defaults. For security purposes, this will wipe the memory and all previously recorded keystrokes will be erased. Plug the device in-between a USB keyboard and PC, and press the 3-key reset combination simultaneously: N, P, S. The keyboard will not stop typing. Repeat two or three times to make sure it has reset. Download http://keyllama.com/files/originalmicro.zip Hold down K, B, S to put the keylogger back into Flash Drive Mode and unzip the downloaded file to the keylogger. When you reconnect the keylogger, all of the settings will be back to the factory presets.

Page 7: ODPD 0LFUR :L)L · :l)l folhqw ,q wklv prgh wkh nh\orjjhu frqqhfwv wr d zluhohvv qhwzrun dqg fdq dffhvv wkh lqwhuqhw wr nhhs wudfn ri wkh wlph dqg wr vhqg orj ilohv yld

~~ USER AGREEMENT ~~ USE AGREEMENT: This Agreement is between Lakeshore Technology Services, LLC (LTS) and you, the user or installer of the KeyLlama keystroke recording device (the "Device"). Your installation or use of the Device indicates your consent to all of the terms of this Agreement. If you do not agree to any term of this Agreement, do not install the Device. Return the product with the plastic shell unopened to the place of purchase for a full refund. PERMISSIBLE USES: The Device was designed and is to be used solely for parents to monitor what their children are doing on the computer and for businesses to monitor what their employees are doing on the computer (the "Permissible Uses"). IMPERMISSIBLE USES: The Device may not be used to violate the privacy rights of others, or to access or intercept electronic communications in violation of wiretap statutes, or to violate company regulations ("Impermissible Uses"). Impermissible Uses include, but are not limited to the following acts: retrieval of credit card information, passwords, personal and/or medical information, confidential and/or proprietary information, or trade secrets. Privacy and wiretapping laws change from time to time and vary from state to state. It is your responsibility to ensure that you are in compliance with federal, state, and local laws. MUST POST NOTICE of MONITORING: If anyone other than you will be using the computer on which the Device is installed, you agree to post a notice visible to each user of the computer to the effect that (i) activities on this system may be monitored and recorded and (ii) that anyone using this system expressly consents to such monitoring and is advised that if such monitoring reveals possible evidence of unauthorized or criminal activity, such evidence may be provided to company or law enforcement officials. SERIAL NUMBER FOR INVESTIGATING ILLEGAL ACTS: A unique serial number may be electronically stored in the Device to aid company and law enforcement officials in the investigation of any unauthorized or illegal acts that may be committed with the Device. You agree to permit LTC to assist these officials by providing serial number and sales information and to download the data from the Device, as necessary in the course of the investigation. LTC may request the assistance of its distributors and customers in providing information relating to the Device(s), and you agree to cooperate with such requests. LICENSE: The Device contains software and firmware instructions (the "Program") on the internal microcontroller. The Device and Program are protected by copyright and other intellectual property laws. LTC hereby grants you the right to: a) use the Program for the Permissible Uses in the United States for as long as you own the Device. b) view, copy, print and distribute copies of the output provided by the Device provided:(1) the output is used for informational purposes only; and (2) any electronic or hardcopy of the output (or portion thereof) includes the following notice: Program and format of the output provided thereby are provided under license from LTC. All Rights Reserved. c) This license is limited to the rights above. Therefore, you are expressly prohibited from taking any other action with the Device, including but not limited to: (1) modifying, reverse engineering, de-compiling or disassembling the Device or the Program; (2) make any attempts to defeat the code protection which is in place on the internal microcontroller; (3) make any attempts to read or copy the Program; (4) attempt to cut open the casing around the Device; (5) sell, rent, lease, lend, or sublicense the Device or otherwise transfer your rights to another, unless the recipient agrees to the terms of the Agreement. LIMITED WARRANTY: LTC warrants that the Device, if provided by LTC, is free from defects in materials and workmanship and for one year from the date of original purchase of the Device, provided the Device was not subject to accident, abuse, or improper use. THIS IS A LIMITED WARRANTY AND ALL OTHER WARRANTIES ARE EXPRESSLY DISCLAIMED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF NON-INFRINGEMENT OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. LTC’S SOLE LIABILITY FOR ANY BREACH OF THIS WARRANTY SHALL BE, IN LTS’S SOLE DISCRETION, TO REPAIR OR REPLACE YOUR DEVICE. LTS will honor this warranty only if you inform LTS of your problem with the Device in writing during the applicable warranty period including evidence of the date the Device was originally purchased. This warranty is void if you violate the terms of this Agreement. To invoke the warranty, request technical support from KeyLlama.com. Send the completed Return Authorization, the defective device, and a copy of the purchase receipt or other evidence of the purchase date, prepaid, to: KeyLlama, 1262 Quail Creek Dr. Holland, MI 49423. Include your name, address, and telephone number. LTS will repair or replace the device and return it to you at its expense. If the device is working properly and the password stored inside the Device does not match the default password or password provided on the Return Authorization, you will be charged $10 for resetting the password. The Device will be returned to you along with the new password. INDEMNIFICATION: You agree to defend, indemnify, save and hold LTS harmless from any and all claims, demands, liabilities, costs or expenses including direct, indirect, incidental or consequential damages and reasonable attorney's fees arising from use or installation of the Device, including claims of statutory violations, violation of right to privacy, [S5] loss of business, or loss of profit. LIMITATION OF LIABILITY: UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT, CONTRACT, OR OTHERWISE, SHALL LTS OR ITS SUPPLIERS OR RESELLERS BE LIABLE TO YOU OR ANY OTHER PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR VIOLATION OF THE RIGHT TO PRIVACY, VIOLATION OF WIRETAPPING STATUTES, LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER DAMAGES OR LOSSES ARISING FROM USE OR INSTALLATION OF THE DEVICE. THE TOTAL LIABILITY OF KeyLlama IS THE PURCHASE PRICE OF THE DEVICE, EVEN IF LTS SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES, OR FOR ANY CLAIM BY ANY THIRD PARTY. EXPORT CONTROLS: You must adhere to export laws regarding the export of software using encryption functionality, which change from time-to-time. At minimum, you may not export or re-export the Device or the Program (i) into (or to a national or resident of) Cuba, Iraq, Libya, Sudan, North Korea, Iran, Syria or any other country to which the U.S. has embargoed goods; or (ii) to anyone on the U.S. Treasury Department's list of Specially Designated Nationals, the U.S. Commerce Department's Table of Denial Orders, or any other person or entity denied export activity by the United States Government. GOVERNING LAW: This Agreement shall be governed in all respects by the laws of the United States and the State of Michigan, except for conflict of laws provisions. The parties agree that for any dispute, controversy or claim arising out of or in connection with this Agreement, venue and personal jurisdiction shall be in the federal or state court with competent jurisdiction located in Ottawa County, Michigan. SEVERABILITY: The provisions of this Agreement will be deemed severable, and the invalidity or unenforceability of any provision will not affect the validity or enforceability of another provision hereof. ENTIRE AGREEMENT: This Agreement constitutes the entire agreement and understanding between the parties and may be amended only by a writing executed by both parties. All Materials are the property of Lakeshore Technology Services, LLC. Copyright 2018, Lakeshore Technology Services, LLC. All Rights Reserved.

~~ END OF USER AGREEMENT ~~