key logger,why? and how to prevent them?

16
Key Logger Bibek Sharma National College Of Engineering

Upload: bibek-sharma

Post on 21-Jun-2015

469 views

Category:

Technology


2 download

DESCRIPTION

Presentation on Keylogger,Its types and its merits demerits and prevention Technique

TRANSCRIPT

Page 1: Key logger,Why? and  How to prevent Them?

Key LoggerBibek Sharma

National College Of Engineering

Page 2: Key logger,Why? and  How to prevent Them?

Introduction Why? Types Detection and Preventaion How Keylogger protect Itself from user?

Today We’ll discuss

Page 3: Key logger,Why? and  How to prevent Them?

Tools used for monitoring and Capturing key

stroke pressed on Key board. person using the keyboard is unaware that

their actions are being monitored. One of the Type Of Spyware .

Key Logger ( Introduction)

Page 4: Key logger,Why? and  How to prevent Them?

To monitor the User’s Activity. To monitor child Activity in the absence of their

parents. To see the Employee’s performance in Corporation To Backup data from accidental Loss. To steal the sensitive information

Like username, Password, credit card no. , pin code ……

Why?

Page 5: Key logger,Why? and  How to prevent Them?

Software Based Key Logger Hardware Based Key Logger

Types

Page 6: Key logger,Why? and  How to prevent Them?

Hypervisor-based: As virtual Machine

e.g. Blue Pills Kernel-based:difficult to write and

detecte.g. Device Driver

API-based: Easy to write and easy to kill

e.g. Getasynckeystate() function

Form grabbing based :log  web form submissions by recording the web browsing onsubmit event functions before encryption.

Software Based Key Logger

Page 7: Key logger,Why? and  How to prevent Them?

Data is uploaded to a website, database or

an FTP server. Data is periodically emailed to a pre-defined email

address. Data is wirelessly transmitted by means of an

attached hardware system. The software enables a remote login to the local

machine from the Internet or the local network, for data logs stored on the target machine to be accessed.

Clipboard logging Screen Logging

Some Extra features

Page 8: Key logger,Why? and  How to prevent Them?

Keyboard hardware Wireless keyboard sniffers: Keyboard overlays (Double Layered ) Acoustic keyloggers(Mobile Kepad Tone ) Optical surveillance(CC Camera,Spy camera)

Hardware Based Keylogger

Page 9: Key logger,Why? and  How to prevent Them?

This method is very popular stealing ATM

machine PIN.

Keyboard OverLay

Page 10: Key logger,Why? and  How to prevent Them?

Optical surveillance (Spy Camera)

Page 11: Key logger,Why? and  How to prevent Them?

It is Like a pendrive which is invisible on

computer. Press hot key to make it visible. There are large no of report Files,just open and

see the Reports.

Hardware Keylogger Report reading Process

Page 12: Key logger,Why? and  How to prevent Them?

Hiding process on Task Manager. Giving False Name like

rundll32.exe,svchost.exe,winlogin.exe,IEEXPLORER.exe

Running Mutual Monitoring Process side by side. Writing Driver which prevent it from killing. Calling dll file using rundll32.exe Keylogger uses Hot Key and password to protect

their Data. e.g.HotKey :- Shift+Alt+S

How Keyloggers protect Itself from user?

Page 13: Key logger,Why? and  How to prevent Them?

Use Anti-Spyware,Anti-Keylogger .e.g:- Spybot Enable “Image Path Name” of Task Manager On

windows 7. Check startup application , msconfig.exe Clear Browser’s cookies after using public

Computer. Use Live CD while using other’s Computer. Use On-screen Keyboard while entering password. Use different Keyboard Layout. Use Smart Card .

Detection And Prevention

Page 14: Key logger,Why? and  How to prevent Them?

Use Speech to Text Services. Use Hand writing recognition Tools. Type Password randomly

if Your password is a1b2c3d4then first type 1234 & then click at first position enter asimilar click on other proper position and enter correspondingletter ,then Key logger logs seems to be 1234[click]a[click]b[click]c[click]d

Detection And Prevention

Page 15: Key logger,Why? and  How to prevent Them?

Screen Shot of Enabling Image Path Name

Page 16: Key logger,Why? and  How to prevent Them?

Be SafeBe Happy

Thank You