Acropolis Institute of Technology and Research, Indore
Acropolis Institute of Technology and Research, Indore
Keyloggers
CS504-(A): Cyber Security
Keylogger
● A Keylogger is a hardware device or software which
monitors every keystroke, chats etc typed on computer. A
keylogger program does not require physical access to the
user's computer. Any person with a basic knowledge of
computer can use keylogger.
Keylogger
Keyloggers can be classified into two main types:
1. Hardware Keylogger
2. Software Keylogger
A hardware keylogger is just like a normal USB drive or any other computer
peripheral so that the victims can never doubt that it is a keylogger,
Hardware keylogger has any inbuilt memory which stores the typed letters.
Eg: Keycoabra, Keysnatch, etc.
Keycoabra
It offers large amount of storage, Keycoabra keystroke recorder comes in a
standard version - 4MB memory capacity, 2,000,000 keystrokes (over 1,000
pages of text), and a Venom version 2 billion keystrokes (over 1 million
pages of text), organized into an advanced flash FAT file system. It is
compatible with all three operating systems windows,linux and Mac OS,
Faculty Name: Rashid Sheikh
Software Keyloggers
These are programs which help getting every key stroke on the
computer.
Software keyloggers can also be classified into two types:
1. Local Keylogger
2. Remote Keylogger
Local Keyloggers are used to monitor local computers (May be your own
Pc), they are very easy to install and are completely undetectable and it’s
really hard to figure out once a keylogger is installed on a computer
because usually keyloggers hide themselves from task manager, Windows
Registry etc. Whenever you want to see logs, screenshots etc you just need
to press a hotkey which (ex. Shift+Ctrl+F10). There are hundreds of
keyloggers available but some of them are user-friendly and are actually
capable to hide themselves once they are installed, some of the Popular
Local Keyloggers are: Spyagent, AllSpy Keylogger, Refog, etc.
Remote Keylogger
● Remote keyloggers are used for the purpose of monitoring a
remote PC, Once a remote keylogger is installed on your computer
the attacker can get your keystrokes, chat logs etc sitting in any
part of the world.
● You can find tons of Remote keyloggers on web but lots of them
are either not capable of properly recording keystrokes or they
have a high antivirus detection rate, these are the popular remote
keyloggers:
1. Sniperspy
2. Winspy
Some keyloggers can work remotely as well as locally. Example,
SpyAgent.
Prevention from Keyloggers
●Anti-Keylogger –
As the name suggest these are the software which are anti / against key loggers and
main task is to detect key-logger from a computer system.
●Anti-Virus –
Many anti-virus software also detect keyloggers and delete them from the computer
system. These are software anti-software so these can not get rid from the hardware
key-loggers.
●Automatic form filler –
This technique can be used by the user to not fill forms on regular bases instead use
automatic form filler which will give a shield against key-loggers as keys will not be
pressed.
●One-Time-Passwords –
Using OTP’s as password may be safe as every time we login we have to use a new
password.
●Patterns or mouse-recognition –
On android devices used pattern as a password of applications and on PC use mouse
recognition, mouse program uses mouse gestures instead of stylus.
●On-Screen Keyboard (Virtual Keyboard)
Keyloggers
Sources:
● Cyber Law Simplified – Vivek Sood, McGraw Hill Education Pvt. Ltd.
● https://www.cryptool.org
● http://index-of.es/EBooks/An%20Introduction%20To%20Keylogger,%20RATS%20And%20Malware.pdf
(A wonderful e-book on Keyloggers and RAT)
● https://www.geeksforgeeks.org/introduction-to-keyloggers/
● https://www.vskills.in/certification/tutorial/security/cyber-security/keyloggers
-and-spywares/
Disclaimer- Parts of the content of this course is based on the materials available from the Web sites and books listed above. The
materials that can be accessed from linked sites are not maintained by Acropolis Institute of Technology and we are not responsible
for the contents thereof. All trademarks, service marks, and trade names in this course are the marks of the respective owner(s).
Any Doubts/Questions
Acropolis Institute of Technology and Research, Indore
Thank You
11