Friday, 18 November 2011

WHAT ARE KEYSTROKE LOGGERS – KEYLOGGERS

A Keystroke logger (also known as a Keylogger) is a program, usually ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by the keylogger somewhere in secret. These can be attached to other executable so you never even know you ran them in the first place, once you click it once it often is started at start up from their on.

There are two main types of keystroke loggers:


1. Software based, and
2. Hardware based

Software based keyloggers

These are software programs designed to work on the target computer’s operating system. Once the software is installed on the target’s computer, it captures every key pressed on the keyboard and stores it down in a file or memory-bank that can be viewed by the person performing the monitoring in real-time, or at a later date.

There is also a type of remote access software keyloggers. This is a process of creating server keylogger and then sending this server.exe file to the victim. Once the keylogger server is installed on the victim’s computer, all text and passwords typed on his computer are sent to you in your email inbox by this server created using keylogger.

Also, server keyloggers are detected by antiviruses. So, you need to have FUD (Fully UnDetectable) keylogger so that victim computer’s antivirus will not detect your sent server keylogger as virus and prevent it from being deleted.

What do you need to use a Remote Keylogger?

* Accounts to send the Logs to

The most used Method’s of sending logs is Gmail and FTP. For gmail go to goole.com and make a Gmail account and for FTP use a free web hosting provider, like t35.com

* A Keylogger Builder

A Keylogger Builder’s are very easy for you to get your hands on one. There are many keylogger builders that you can use, but they will all be detected by anti-virus or UD (Undetectable). UD Keylogger means that some anti-virus software will detect it and aleart the victim telling him that it is a virus and it will be deleted from his system. What you really want is a FUD Keylogger (Fully Undetactable). That means no anti-virus software will alert the victim saying its a virus. There are very few FUD Keyloggers on web and the most of the time you need to buy a keylogger that will be FUD for a long time. They normally cost about 3$-20$, depending on the functions of the Builder.

Hardware based keyloggers

Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.

The tiny size and ideal location ensures it almost never gets found; and if it does get found, nobody would necessarily know what it was anyway! You can set it up so you can get the data in another location and you don’t need to be able to log on to the person’s machine to install it successfully.



Which type you use depends entirely up to you, the capabilities you have (whether or not you can access the machine) and what kind of data you need. Either way, keyloggers are powerful tools that can pay huge dividends in protecting your home and business.

No comments:

Post a Comment