Analysis of Keyblogger
Disclaimer: This work has been submitted by a student. This is not an example of the work written by our professional academic writers. You can view samples of our professional work here.
Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays.
Published: Tue, 02 Jan 2018
Keyblogger is basically a spyware. As indicated by its namesake, it logs or recors your keystrokes. When you type in your username or password, this information is logged and amde available to the hacker. Keyloggers can either be physical or software-based, the latter being more difficult to detect.
A keylogger works in several different ways
Each keystroke is recorded and immediately dispatched to some remote listener over the internet.
Keystroke are collected ina temporary file, which is then periodically uploaded to the author’s location over the internet.
The keystrokes are collected in a temporary file, but much like a spam bot, can listen for and recieve instructions from the author. The logger could thus upload the collectedinformation when requested.
The collected keystrokes could never be uploaded. Instead, if someone has remote access to your machine, or even physical access to your machine, they could simply come by and copy theinformation manually.
Finally, the information may not even be kept on your machine. There are keyloggers that include a little flash memory and can be quickly inserted in between installing, the person behind it stops by and picks up the device containing all yourinformation.
There are two methods for bypassing keyloggers, both which involve confusing the logger with random keystrokes. The first, when you need to enter a username or password, is to randomly insert irrelevant numbers and letters in between the same. Once entered, just select the random hits wih the mouse and delete them before logging in. The second is for foolingkeyloggers that capture all keystrokes and not just those typed in the password box. Enter your info randomly across the browser and search bars along with random numbers and letters. When you wish to log in, simply copy and paste the relevant bits into the log-in boxes.
You can use KYPS, a reverse proxy server that takes a password, encrypts into a one-time code, printed from the KPYS web site that can be used to log into any computer safely. After being decrypted by the KYPS system and logged in, it deletes the one time code as a password. KYPS also acts as a normal proxy to protect your browsing history. When browsing, it displays the KYPS URL along with random characters and symbols to maximise security.
The ” work offline” option shouldn’t be relied on too often. This feature is specific to Internet Explorer or the application with that function, and its not too hard for a keylogger to bypass something so narrow. Also, even if you physically pulled out the internet connection wire from your PC, only the first of the above approaches is rendered harmless. The keylogger can still quietly collect the data and transmit it when a connection is available.
As such, there is no way to be 100% carefull against keyloggers. It depends on specific keyloggers most of the time. However, you should always remain careful and cautious when entering a cyber café
Cite This Work
To export a reference to this article please select a referencing stye below: