Top Banner
SPYWARES & KEYLOGGERS Presented By JITHIN JAMES
23

Spywares & Keyloggers

Jul 21, 2015

Download

Internet

Jithin James
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Spywares & Keyloggers

SPYWARES&

KEYLOGGERSPresented By

JITHIN JAMES

Page 2: Spywares & Keyloggers

Introduction What are Spywares? What are Key loggers? Demo

Outline

Page 3: Spywares & Keyloggers
Page 4: Spywares & Keyloggers

What Are Spywares ? Applications that send information from your

computer to the creator of the spyware

Consists of an core functionality and a hidden functionality of information gathering

Can be used for marketing information, to determine their stance with regard to competitors and market trends

Can also be used to log keystrokes and send those to whomever

Page 5: Spywares & Keyloggers
Page 6: Spywares & Keyloggers

DefinitionSpyware is software that aids in gathering information about a person or organization

without their knowledge may send such information to another entity without the consumer's consent

asserts control over a computer without the consumer's knowledge.

Page 7: Spywares & Keyloggers

Spyware Symptoms

The major symptoms are

reset your browser's home page produce even more invasive advertisements “pop-up” ads unwanted CPU activity disk usage network traffic applications freezing failure to boot system-wide crashes

Page 8: Spywares & Keyloggers

Spyware Symptoms(Continued)

Page 9: Spywares & Keyloggers

Types of Spyware

Spyware can be broken down into four different categories:

System monitors Trojans Adware Tracking cookies

Page 10: Spywares & Keyloggers

System Monitors

Tracking Software used to monitor computer activity keystrokes, e-mails, chat room conversations, instant

messages, Web sites visited, programs run, time spent on Web sites or using programs, or user-names and passwords.

The information is typically either stored for later retrieval or transmitted to the remote process or person employing the Monitor

Key-loggers and Screen Scrapers are types of System Monitors.

Page 11: Spywares & Keyloggers

Trojans Trojans Horses or Trojans are malicious programs that appear

as harmless or even desirable applications. Designed to cause loss or theft of computer data, and to

destroy your system. Seven major types

Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-of-Service attack (DoS) Trojans

Page 12: Spywares & Keyloggers

Trojans(Continued)

Page 13: Spywares & Keyloggers

Trojans(Continued) Notable Trojans

Netbus Advance System Care(by Carl-Fredrik Neikter)

Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus Flashback Trojan (Trojan BackDoor.Flashback) ZeroAccess Koobface Vundo

Page 14: Spywares & Keyloggers

Adware

It is any software package which automatically renders advertisements in order to generate revenue for its author.

Software that displays pop-up advertisements tuned to the users current activity, potentially reporting aggregate or anonymized browsing behavior to a third party

Track personal information (including your age, gender, location, buying preferences, surfing habits, etc.)

Page 15: Spywares & Keyloggers

Tracking Cookies

Cookies that can track your Web activities May include cookies that contain

• user names• passwords

other private information that you enter on web sites (SSN, banking info, credit cards)

Page 16: Spywares & Keyloggers

Preventive Techniques

Don't install any application unless you are certain of what it does or where it came from.

Always read the license agreement Software and OS upgrades Utilize browser's security settings Use Anti-Spyware

Spy Sweeper Microsoft Windows Anti-Spyware Spyware Doctor Spyware Slayer Spy Killer Spy Remover

Page 17: Spywares & Keyloggers

What are Keyloggers?

Keystroke logging, or keyboard capturing the action of recording (or logging) the keys

struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware

that their actions are being monitored

Page 18: Spywares & Keyloggers

Types of Keyloggers

Hardware Keyloggers Software Keyloggers

Installs in 5 se co nds, simply plug it in.

Re quire s a passwo rd to lo g into the co mpute r.

Can be installe d witho ut lo g g ing into the co mpute r.

Re quire s administratio n rights to install.

Can be remo ve d, and the info rmatio n re trie ve d o n ano the r

co mpute r.Re quire s that so ftware be installe d

o n the co mpute r.

Re quire s re aching behind the co mpute r to plug the de vice in.

Can re co rd o pe rating system e ve nts such as pag e file size , e tc .

Page 19: Spywares & Keyloggers

Hardware Keylogger

Page 20: Spywares & Keyloggers

Software Keylogger

Page 21: Spywares & Keyloggers

Some Examples Actual Spy Keylogger Ardamax Keylogger Ghost Keylogger Golden Keylogger Home Keylogger Invisible Keylogger KGB Keylogger Remote Keylogger Soft Central Keylogger Stealth Keylogger

Page 22: Spywares & Keyloggers

DEMO – 1

Actual Spy Keylogger

Page 23: Spywares & Keyloggers

THANK YOU