Advertisement

  • Beginner Hacking: Keyloggers Explained


    Keystroke logging (often called keylogging) is the practice of tracking(or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based to electromagnetic and acoustic analysis. The elements used for Key logging are known as KeyLoggers...

    Mostly used types KeyLoggers are:


    1. Software based keyloggers.
    2. Hardware based keyloggers.


    The two types of remote keyloggers, hardware and software, work in the same basic manner.


    1. Software based keyloggers
    The software based keylogger runs as a hidden/invisible process that intercepts (logs) all keystrokes typed on the computer on which it is running.

    The software based keylogger then delivers the keystrokes, at set intervals, to certain specified destinations such as to the email address of the person who configured the keylogger to intercept the keystrokes....!!!!


    Software Keyloggers can be :


    1. Hypervisor-based (keylogger hides itself in a malware process)
    2. Kernel based (keylogger reside at the kernel level and are thus difficult to detect)
    3. Hook based




    2. Hardware based keyloggers
    The hardware keylogger typically plugs into the keyboard connector on the back of a computer, then the end of the keyboard cable plugs into the hardware keylogger, and all keystrokes are intercepted (logged) by the keylogger device.


    The hardware remote keylogger delivers the keystrokes wirelessly, via bluetooth or other standard wireless transmission means (802.11 wireless networking), into the air around the computer.




    The person who configured and installed the hardware or software keylogger recovers the keylogger's keystrokes, either by receiving that information via email from the software keylogger, or by receiving the hardware keylogger's keystrokes by being nearby, with a network receiver, keyed to the keylogger's frequency and access code. The recipient of the keylogger information then proceeds to "replay" the keystrokes, in order to determine passwords and other sensitive information that was typed by the person on whose computer the keylogger was installed.




    Countermeasures:
    Although there are many Anti-Keylogging softwares available in the market now a days... and with the increasing Security updates of AntiVirus and Internet Security softwares.... The presence of SOFTWARE Based Keyloggers can be detected. Enabling a firewall does NOT stop keyloggers , but can prevent the remote installation of key logging software, and possibly prevent transmission of the logged material over the internet if properly configured...!!


    However there is nothing we can do with HARDWARE based Keyloggers....!!
    Only Denial of physical access to sensitive computers, e.g. by locking the server room, is the most effective means of preventing hardware keylogger installation. Visual inspection is the primary means of detecting hardware keyloggers, since there are no known methods of detecting them through software.


    Hope you had enjoyed reading it....
    Any suggestions are highly welcomed....!!!

0 comments:

Leave a Reply

Featured Video

Partner