0% found this document useful (1 vote)
659 views

Key Logging

The document discusses keylogging, including what it is, different types of keylogging devices and methods, and countermeasures against keylogging. It describes how software and hardware keyloggers work to capture typed keystrokes and save them to a log. Technical countermeasures include using code signing, firewalls, automatic form fillers, one-time passwords, and anti-keylogging software. Non-technical methods involve alternating typing locations or using a mouse to manipulate typed text.

Uploaded by

Jayant Pai
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
659 views

Key Logging

The document discusses keylogging, including what it is, different types of keylogging devices and methods, and countermeasures against keylogging. It describes how software and hardware keyloggers work to capture typed keystrokes and save them to a log. Technical countermeasures include using code signing, firewalls, automatic form fillers, one-time passwords, and anti-keylogging software. Non-technical methods involve alternating typing locations or using a mouse to manipulate typed text.

Uploaded by

Jayant Pai
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

KeyStroke Logging and its Countermeasures

SEMINAR GUIDE : Ms. Sharada.K.


Seminar by: MEGHASHREE.V.NADIGER. 2KA06IS016

Key logging.

Contents
 What is

keylogging? of

 Different types

keylogging
 Countermeasures

 Technological methods  Non-technological methods




Conclusion
Key logging.

Keystroke logging
Key-logger is a surreptitious surveillance application, which is used to keep record of user's activities on the computer.  Key logging is the capture of typed characters.  Key logging has both lawful and unlawful applications.


Key logging.

How Keyboards work

Key logging.

Different types of Keyloggers


Software keyloggers
Capture keystroke information as it passes between the computer keyboard interface and the OS.  The logger resides in the o.s kernel and interprets the keystokes.  The keyloggers can be detected only by HIPS(Host intrusion prevention software).  They do not show up in the list of running processes and run without the knowledge of the user.  Detection methods.


Key logging.

Different types of Keyloggers (contd)


Hardware keyloggers
Device placed inline with the c.p.u port and the keyboard pin.  In case of laptops, a circuit is printed within the keyboard or the devices are installed within.  Bluetooth keyloggers provide the advantage of accessing the information directly without retrieving the device from the system it is attached.


Key logging.

The text saved in the log of the keylogger and the various types of keylogging devices.

Key logging.

Different types of Keyloggers (contd)


Wireless keyboard intercept
Uses 27 MHz RF connection that covers a 6 feet radial distance.  The keystrokes are flagged in the keyboard so that the receiver can process it.  This enables the R.F device to convert the captured packets into corresponding character streams.  If a workstation is processing highly sensitive information, dont use 27 MHz wireless keyboards.  The disadvantage is that wireless intercept keyloggers need a receiver/antenna relatively close to the target system.

Key logging. 8

Different types of Keyloggers (contd)


Acoustic keylogging
The keylogger listens to the key typed on the keyboard and converts them into character streams.  These devices are also used to remotely listen to conversations and convert them into the required language script.  Such microphones can be placed in the target work area or can be buttoned to an individual. Parabolic microphones are an example of a long distance device.


Key logging.

Technical countermeasures
Code signing


Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted.

AntiAnti-spyware


Spyware is a type of malware that is installed on computer and collects little bits information at a time about users without their knowledge. Anti-spyware applications are able to detect many keyloggers and cleanse them. Responsible vendors who monitor software support, detect keyloggers by anti-spyware programs, thus preventing the abuse of the software.
Key logging.

10

Firewall


Frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets Enabling a firewall does not stop keyloggers , but can prevent the remote installation of key logging software, and possibly prevent transmission of the logged material over the internet if properly configured.

Key logging.

11

Automatic form filler programs




Form fillers are primarily designed for web browsers to fill in checkout pages and log users into their accounts. Once the user's smart card information has been entered into the program, it will be automatically entered into forms without ever using the keyboard or clipboard, thereby reducing the possibility that private data is being recorded.

OneOne-time passwords (OTP)


 

Using one-time passwords is completely keylogger-safe because the recorded password is always invalidated as soon as it's used. One example is online banking.
Key logging.

12

WebWeb-based keyboards
  

Keyboard image is displayed with all its keys on the screen. User presses the keys by clicking with a mouse. Some commercial key logging programs do not record typing on a web-based virtual keyboard.

Key logging.

13

Key logging.

14

Online form filling using web based virtual keyboards.

Key logging.

15

AntiAnti-keylogging software


It will disable this hook mechanism so the text will never reach the key logger program. Consequently, it will break some other programs that rely on this hook mechanism. Keylogger detection software is also available. Some of this type of software use "signatures" from a list of all known keyloggers. It provides a hotkey combination to quickly disable or enable typing protection. Speech-to-text conversion software can also be used against keyloggers, since there are no typing or mouse movements involved.

Speech recognition


Key logging.

16

NonNon-technological methods


Some keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window. Similarly, a user can move their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order e.g. by typing a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. Another very similar technique utilizes the fact that any selected text portion is replaced by the next key typed. E.g. if the password is COMPUTER", one could type C", then some dummy keys pqrs". Then these dummies could be selected with mouse, and next character from the password O" is typed, which replaces the dummies pqrs".

Key logging.

17

Conclusion.
 A keylogger

is a type of software that is used for keystroke logging, which is the practice of monitoring the keys that are punched on a computer keyboard. Keylogging is often done for nefarious purposes, like stealing passwords and banking information. Antispyware programs, firewalls, network monitors and automatic form filler programs can all be used as protection against keylogging programs.

Key logging.

18

THANK YOU
Key logging. 19

You might also like