all you need to know about a key logger

22

Upload: kunal-kapoor

Post on 22-Jan-2018

179 views

Category:

Software


2 download

TRANSCRIPT

Page 1: All you need to know about a Key logger
Page 2: All you need to know about a Key logger

What is Key Logger ???

A key logger is a hardware device or a software program that records the real

time activity of a computer user including the keyboard keys they press.

Keyloggers are used in IT organizations to troubleshoot technical

problems with computers and business networks.

Keyloggers can also be used by a family (or business) to monitor the

network usage of people without their direct knowledge.

Finally, malicious individuals may use key loggers on public

computers to steal passwords or credit card information.

It can be used by parents to keep eye on their children's or company owner to

spy on their employs.

Page 3: All you need to know about a Key logger

How It Can Harm ???

It can be used by your enemy or friend to get sensitive

information such as your username and password, Bank

credit card details, or any other activities you do on your

computer.

Example:-You login in to your Facebook account from a

computer in which key logger is install then your

username and password will be captured.

Page 4: All you need to know about a Key logger

Types of Key Loggers

Hardware Key Logger.

Software Key Logger.

Page 5: All you need to know about a Key logger
Page 6: All you need to know about a Key logger
Page 7: All you need to know about a Key logger

Various Key Logger Names

Award Key logger Pro 3.2.

Ultimate Keylogger Free.

BlackBox Security Monitor.

Refog Free Keylogger.

Super WinSpy.

Personal Keylogger.

NextGen AntiKeylogger Free.

Romaco Keylogger.

PyKeylogger.

Koom Keylogger.

Heretic Macro.

Keylogger Douglas.

Revealer Keylogger Free Edition.

Page 8: All you need to know about a Key logger

Step By Step Working of Key Logger

We will now check out how key logger works.

How to do settings of email delivery in key

logger.

Now we will check the Award Key Logger the

best key logger to explain the concept of key

logger.

Page 9: All you need to know about a Key logger

Screen After Installing Award Key Logger

Page 10: All you need to know about a Key logger

After Clicking Global Setting of the Award

Key Logger

Page 11: All you need to know about a Key logger

General Settings

Page 12: All you need to know about a Key logger

Logging Info Gathering

Page 13: All you need to know about a Key logger

When to Start up the Key Logger

Page 14: All you need to know about a Key logger

Data Send to Email

Page 15: All you need to know about a Key logger

Data Sending

Here we have to setup an SMTP port.

The SMTP port is used for sending email to the

respective email which we have mentioned.

For Example here we have used

[email protected].

The Default port for the SMTP is 25 but the

alternate port is 465.

We have to set SMTP ACCOUNT and SENDER

same email id and password of the email id

concerned.

Page 16: All you need to know about a Key logger

Mailing Port

Page 17: All you need to know about a Key logger

Snapshot Recording

Page 18: All you need to know about a Key logger

Stealth And Invisible ie. Hiding Key Logger

Page 19: All you need to know about a Key logger

Log Details

Page 20: All you need to know about a Key logger

Remote Installer

Page 21: All you need to know about a Key logger

Remote Installation

For remote installation of award key logger you should have to buy the licensed key logger.

The cracked or the patched key logger doesn’t work for the remote installation.

The other method you can use a RAT(Remote Access Torjan) instead of Key logger but the .exe file should be FUD.

Page 22: All you need to know about a Key logger