Keylogger Tutorial

Tuesday, October 13, 2009

Keylogger Tutorial
"Keylogging" is a shorthand term for the practice of keystroke logging. This is a form of computer surveillance that involves the recording of every key struck on a keyboard by software running locally (usually hidden) on the machine being monitored, as a hardware addition to the machine (such as a USB keystroke logger), or on the network that machine is connected to
Software Keystroke Logging

one point to Keylogger Tutorial is a sofware keysstroke
1.Software keystroke loggers usually run as applications on the system that is being monitored and basically perform like any other piece of software on that operating system. The one quality that sets most keystroke loggers apart from other software is that programmers usually go to great lengths to hide evidence that the keystroke logger is actually running. This includes making the application invisible and usually only accessible by a predefined combination of keystrokes and obfuscating the process names to avoid identification.

There are several different types of software keystroke loggers. Hyper-visor based keystroke loggers run like virtual machines without employing the functions of the operating system. This makes them more difficult to detect. Kernel based keystroke loggers reside at the kernel level and are the most powerful keystroke loggers. Kernel based keystroke loggers subvert the operating system and gain direct access to the hardware through methods like spoofing the keyboard driver. Hook based keystroke loggers record keystrokes through functionality provided by the operating system. The passive method gains access to keystrokes through the operating system's APIs. And the Form Grabber method, perhaps the most common type of keystroke logger, records information submitted to web-forms. In some cases, as with many malware form grabbing keystroke loggers, information that is recorded can be transmitted to a remote computer for review.
Hardware Keystroke Logging

second point to Keylogger Tutorial is a hardware
2. The key feature of hardware key loggers is that they do not depend on any software being installed. Hardware keystroke loggers come in two basic forms: firmware-based and as physical hardware. Firmware keystroke loggers work at the BIOS level and must be installed physically on the machine. This method works by adding a logging feature to the physical keyboard interface.

Hardware can also be installed directly in a computer keyboard, the computer's internal memory or a USB port in order to record keystrokes. The primary advantage to hardware keystroke loggers is that they do not depend on any software being installed on the computer. This allows them to function with greater stealth and keeps them from interfering with other software on the computer. For example, a hook based software keystroke logger directly logs keystrokes through functions built into the operating system. However, this uses a notable amount of resources and a suspicious user could easily determine that some foreign software was running. Another advantage of high end hardware keystroke loggers is that they can interface with many computers over a network, providing wide reaching network surveillance.

0 komentar:

Post a Comment