What is Keylogger or Keystroke Logging?

What is Keylogger or Keystroke Logging
You are here:

Keyloggers or keystroke loggers are software programs or hardware devices that track the activities of a keyboard. Keyloggers are a form of spyware where users are unaware their actions are being tracked. Hackers may use them to maliciously gain access to your private information, while employers might use them to monitor employee activities. Some keyloggers can also capture your screen at random intervals; these are known as screen recorders. Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions.

How your Computer gets keylogger?

A keylogger can be installed on your computer any number of ways. Anyone with access to your computer could install it; keyloggers could come as a component part of a virus or from any application installation, despite how deceptively innocent it may look. This is part of the reason why you should always be sure you’re downloading files from a trusted resource.

Most companies implant keylogger software to send recorded data to a remote location. This happens by using one of the following methods:

• Uploading the data to a website, database or FTP server.

• Periodically emailing data to a predefined email address.

• Wirelessly transmitting data through an attached hardware system.

• Software enabling remote login to your local machine.

Additional features that some software keyloggers come with can capture additional information without requiring any keyboard key presses as input. They include:

• Clipboard logging – Anything copied to the clipboard is captured.

• Screen logging – Randomly timed screenshots of your computer are logged.

• Control text capture – The Windows API allows for programs to request the text value of some controls, it means that a password can still be captured even if it is behind a password mask.

• Activity tracking – Recording of which programs, folders, and windows are opened and also the screenshots of each.

Recording of search engine queries, instant message conversations, FTP downloads along with any other internet activities.

Keylogger Hardware – can monitor your activities without any software being installed at all. These loggers take the form of a piece of hardware inserted somewhere between the computer keyboard and the computer, typically along the keyboard’s cable connection. There are of course more advanced implementation methods that would prevent any device from being visible externally. This type of hardware keylogger is advantageous because it is not dependent on any software nor can it be detected by any software.

Wireless keyboard sniffers – It is possible for the signals sent from a wireless keyboard to its receiver to be intercepted by a wireless sniffer.

Keyboard overlays – Overlays are popular in ATM theft cases where thieves capture a user’s PIN number. This device is designed to blend in with the machine so that people are unaware of its presence.

How to Detect and Remove Keylogger?

There are a variety of ways to detect a keylogger, though none are a catchall, so if you have reason to suspect your computer has a keylogger, we recommend trying a variety of these tactics:

• Run an antivirus, to detect a keylogger on your system. There is some specific type of AV dedicated for such scans.

• Press ctrl+alt+del to check the task list on your computer. Examine the tasks running, and if you are unfamiliar with any of them, look them up on a search engine.

• Scan your hard disk for the most recent files stored. Look at the contents of any files that update often, as they might be logs.

• Use your system configuration utility to view which programs are loaded at computer start-up. You can access this list by typing “msconfig” into the run box.

Julia Sowells957 Posts

Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.

0 Comments

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register