Keyloggers:
One of the best use of keyloggers is that we can spy on any computer easily. Key loggers are of different types. They are
- Remote keyloggers and
- Stealth keyloggers
Remote keyloggers:
As we know that remote keyloggers are very easy to use when compared with trojans where all the ip addresses and port numbers are involved.
Keylogger records the keystrokes of the victim. It records each and every data that was being communicated with the victim's system. It records and takes the screenshots and saved it into the attacker's personal data space. It is generally used for spying on children by parents and for some other useful purpose. But nowadays it is used for malicious activities and to find passwords and reduce confidentiality of the victim. Many antivirus detects keyloggers and prevent them from losing data. But many keyloggers are still in use.
methodology of attacker in using remote keylogger:
- First the attacker needs to create an executable file of size in kbs
- Attacker may hide this exe file behind any genuine file like iso file or a song..... The victim is now supposed to double click on this image file and hence download it.. here the attacker follows trojan process
- As the victim clicks it the keylogger gets installed in the victim's system and secretly records the information or the text typed by the victim or keystrokes.. As the victim is connected to the internet the information collected will be transferred through FTP protocol to the attacker's database.
Step by step process to operate a remote keylogger:
- Download a free remote keylogger Ardamax with it's serial key. password: explorehacking.com. Antivirus detect it as a virus but don't worry
- sign up at FTP supporting web hosting to upload your files
- Now you need to click on remote installation on victim's computer
- After successful installation the key logger will run on hidden mode in victims computer and the data will be transferred to the attacker through file transfer protocol.
No comments:
Post a Comment