all you need to know about a key logger

Post on 22-Jan-2018

179 Views

Category:

Software

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

What is Key Logger ???

A key logger is a hardware device or a software program that records the real

time activity of a computer user including the keyboard keys they press.

Keyloggers are used in IT organizations to troubleshoot technical

problems with computers and business networks.

Keyloggers can also be used by a family (or business) to monitor the

network usage of people without their direct knowledge.

Finally, malicious individuals may use key loggers on public

computers to steal passwords or credit card information.

It can be used by parents to keep eye on their children's or company owner to

spy on their employs.

How It Can Harm ???

It can be used by your enemy or friend to get sensitive

information such as your username and password, Bank

credit card details, or any other activities you do on your

computer.

Example:-You login in to your Facebook account from a

computer in which key logger is install then your

username and password will be captured.

Types of Key Loggers

Hardware Key Logger.

Software Key Logger.

Various Key Logger Names

Award Key logger Pro 3.2.

Ultimate Keylogger Free.

BlackBox Security Monitor.

Refog Free Keylogger.

Super WinSpy.

Personal Keylogger.

NextGen AntiKeylogger Free.

Romaco Keylogger.

PyKeylogger.

Koom Keylogger.

Heretic Macro.

Keylogger Douglas.

Revealer Keylogger Free Edition.

Step By Step Working of Key Logger

We will now check out how key logger works.

How to do settings of email delivery in key

logger.

Now we will check the Award Key Logger the

best key logger to explain the concept of key

logger.

Screen After Installing Award Key Logger

After Clicking Global Setting of the Award

Key Logger

General Settings

Logging Info Gathering

When to Start up the Key Logger

Data Send to Email

Data Sending

Here we have to setup an SMTP port.

The SMTP port is used for sending email to the

respective email which we have mentioned.

For Example here we have used

skynetsecure11@gmail.com.

The Default port for the SMTP is 25 but the

alternate port is 465.

We have to set SMTP ACCOUNT and SENDER

same email id and password of the email id

concerned.

Mailing Port

Snapshot Recording

Stealth And Invisible ie. Hiding Key Logger

Log Details

Remote Installer

Remote Installation

For remote installation of award key logger you should have to buy the licensed key logger.

The cracked or the patched key logger doesn’t work for the remote installation.

The other method you can use a RAT(Remote Access Torjan) instead of Key logger but the .exe file should be FUD.

top related