A Seminar: GNIT Girls Institute of Technology
A Seminar: GNIT Girls Institute of Technology
A Seminar: GNIT Girls Institute of Technology
on
KEYLOGGERS
(Submitted in the partial fulfillment of the B-Tech degree)
Submitted By: Kalpana Mrs. Vivekta Roll Number: 1041610035 MAR-2013 Batch: 2010-2014
Submitted To:
Dated : 20-
ACKNOWLEDGEMENT
I Kalpana Dubey hereby declared that the above project report is been developed an analyzed completely by me only and none of the content is copied or replicated from other internet sources. If any content is found as plagiarism then it is just a coincidence and done without any intention. Further, we have worked to achieve the best of the report.
ABSTRACT
A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Keyloggers can also be used by a family (or business) to monitor the network usage of people without their direct knowledge. Finally, malicious individuals may use keyloggers on public computers to steal passwords or credit card information. Some keylogger software is freely available on the Internet, while others are commercial or private applications. Most keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server. Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Detecting the presence of a keylogger on a computer can be difficult. So-called anti-keylogging programs have been developed to thwart keylogging systems, and these are often effective when used properly. In the following Developed Report various aspects related to keyloggers have been discussed. We have also discussed the methods to identify the presence of keyloggers in a specific system. Now, let us begin the subject.
CONTENT
1. TITLE (1) 2. ACKNOWLEDGEMENT (2) 3. ABSTRACT (3) 4. CONTENTS ...(4) 5. INTRODUCTION (5) 1.1 Types Of keyloggers.. (5) 1.1.1 1.1.2 Hardware Keyloggers..(5) Software ........(7) Keyloggers
THREAT
OF KEYLOGGER.(15)
FEATURES
A
A ?
..
1. INTRODUCTION
An early keylogger was written by Perry Kivolowitz and Keystroke logging (more often called keylogging or "keyloggers") is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.
Posted to the Usenet news group net.unixwizards,net.sources on November 17, 1983.The posting seems to be a motivating factor in restricting access to /dev/kmem on Unix systems. The user-mode program operated by locating and dumping character lists (clists) as they were assembled in the Unix kernel.
1.2 TYPES OF KEYLOGGERS AND THEIR WORKING
Keyloggers are of basically two types. They are as follows : Hardware Keyloggers Software Keyloggers
5
1.2.1Hardware Keyloggers A hardware keylogger is also used for keystroke logging, a hardware keylogger is plugged between the keyboard plug and the USB or PS/2 port socket, and they work with PS/2 keyboards and also usb keyboards, A hardware keylogger is just like a normal USB drive or any other computer peripheral so that the victims can never doubt that it is a keylogger, Hardware keylogger has any inbuilt memory which stores the typed keystrokes.
Fig.1 The above Image shows you how a hardware keylogger is installed.
Example : Keysnatch- A Popular Hardware Keylogger: Keysnatch has also a variety of keyloggers including PS/2 keyloggers, USB keyloggers and Wifi keyloggers, The Wifi keylogger has a built in WLAN transceiver and TCP/IP stack, which means that it can connect to the internet through a wifi-acess point
How It Works? Once the wifi keylogger has connected to an access point, The Keysnatch wifi keylogger will then actively send you all the keystrokes typed by the victim to any email address you provide. The keysnatch wifi keylogger is compatible with all other major operating systems, you name it and it runs on it. Keysnatch keylogger supports all types of keyboards and the best part is that its completely undetectable by antiviruses. 1. Software Keyloggers The hardware keyloggers are extremely useful only in case if you have physical access to victims computer, but what if you dont have physical access to victims computer and sometimes the victim might notice it. This is where software keyloggers come into play, Software keyloggers can also be classified into two types:
8
1. Local Keylogger 2. Remote Keylogger 1. Local Keylogger Local Keyloggers are used to monitor local computers (May be your own Pc), they are very easy to install and are completely undetectable and its really hard to figure out once a keylogger is installed on a computer because usually keyloggers hide themselves from taskmanager, Windows Registry etc. Whenever you want to see logs, screenshots etc you just need to press a hotkey which (ex. Shift+Ctrl+F10). There are hundreds of keyloggers available now days but some of them are userfriendly and are actually capable to hide themselves once they are installed, some of the Popular Local Keyloggers are: Example : SpyAgent Spytech agent is an award winning software which can be used to monitor both local and remote computer but its usually good local monitoring, for remote monitoring there are software better than SpyAgent with far more features than it. Spytech Spyagent runs in total stealth mode and once it is installed on victims computer it's almost impossible to detect it's presence. Here follows the steps , how to install the keylogger software in your system. Step 1 - First of all download Spytech Spyagent, after downloading your copy of SpyAgent navigate to where you downloaded (in this case it is on the Windows desktop). Double click the SpyAgent installer file to start the SpyAgent install.
NOTE: After install is complete you can delete this file! Step 2 - Click through the installer until you come to this screen. This is where you choose the folder location for SpyAgent's install. We recommend you change this from the default (c:\program files\spytech software...) to the path below, or something of your own making. Make sure you remember this path to access the software! Once you configure the Destination Directory, click the Next button.
Step 3 - Click through the installer until you come to this screen. This is where you choose the install type for SpyAgent. If you want SpyAgent to not appear in the start menu and install the bare minimum files then choose the Stealth installation, as shown below. Click Next when you have done so.
10
Step 4 - When you are done configuring the install you will be asked if you want to include an uninstaller. For total stealth choose NO - as shown.
Step 5 - After your install completes you will now have to configure and run SpyAgent! Go to the START button on your desktop and click it once to bring up the Start menu. Choose the RUN... option to get the below window. You will have to enter your installation path (this is the
11
same path from the installer that you just entered!) When you have entered it press OK. Step 6 (optional) - Once you are in the install directory you will see the SpyAgent files below if you have chosen Stealth install. Now, Highlight the sysdiag.exe file as shown below
Step 7 (optional) - Right click on the sysdiag.exe file and choose RENAME from the menu by clicking on it. Step 8 (optional) - You will now be able to type a new name in for sysdiag.exe. As you can see below we chose to name it "snmp.exe". Use the below name, or something of your making to conceal SpyAgent's identity.
clicking the file you renamed! You will be prompted to configure your password - do so. Once inside SpyAgent click on the 'GENERAL' button on the right side of the SpyAgent window. The below window will appear - enable the options exactly as you see in the below window. After you configure the General options you can click the LOGGING tab and configure the logging options as well! When you are done click OK to save your options!
13
Step 10 - Almost done! Now all that is left to do is click the Start Monitoring button that is highlighted below! You will be prompted for your password - enter it, and click OK. You will receive a notification message on how to bring SpyAgent out of stealth mode to later view logs - read this message carefully! Now SpyAgent is in total stealth. When you restart your PC it will run invisibly as well. To stop stealth mode run the nostealth.exe in the SpyAgent installation directory, or press CONTROL+SHIFT+ALT+M on your keyboard to bring up the password window!
1. Remote Keyloggers Remote keyloggers are used for the purpose of monitoring a remote pc, Once a remote keylogger is installed on your computer the attacker can get your keystrokes, your webcam shots, chat logs etc sitting in any part of the world You can find tons of Remote keyloggers on web but
14
lots of them are either not capable of properly recording keystrokes or they have a high antivirus detection rate, With my experience of 4 years in the field of Ethical hacking and security I have tested over 50 different keyloggers and have found just these two keyloggers worth the price.
15
security solution, as it's usually impossible for a user to tell that a keylogger has been installed on his/ her machine.
According to Cristine Hoepers, the manager of Brazils Computer Emergency Response Team, which works under the aegis of the countrys Internet Steering Committee, keyloggers have pushed phishing out of first place as the most-used method in the theft of confidential information. Whats more, keyloggers are becoming more sophisticated they track websites visited by the user and only log keystrokes entered on websites of particular interest to the cyber criminal. In recent years, we have seen a considerable increase in the number of different kinds of malicious programs which have keylogging functionality. No Internet user is immune to cyber criminals, no matter where in the world s/he is located and no matter what organization s/he works for.
Keystrokes Recording A KeyLogger records every keystroke typed by application, by date and time thus you will know what was typed, where and when it was typed, and you will also know WHO typed it! Sites Recording The Web Site Recording feature continually monitors every web page that is accessed on the computer and saves a record of the visited URLs chronologically for your review. Chat and Instant Message Recording A KeyLogger captures popular chat and instant messaging services and supplies a clear record of all conversations that
16
2.
3.
have taken place. One click and you will see a list of chat conversations. Both sides of chat conversations and instant messages are recorded and saved chronologically for your review. Inside Keylogger records both ways for: AOL, ICQ, Yahoo messenger, MSN Messenger, Trillian.
4.
Application / Program Recording A Keylogger records every program or application and program window run on the computer you are monitoring thus allowing you to see at a glance ALL of the applications that have been used. Printing Activity Recording It monitors all printing activities, recording the name of the printed document and the number of printed pages. System Logon/Logoff Recording It also provides information on who and when exactly has used the computer. Screenshot Recording Keylogger acts very much like a surveillance camera by taking snapshots of your screen as frequently as you want. That means you get detailed visual recordings of all chat conversations, instant messages, emails typed and read, all web sites visited, all programs run, all keystrokes typed everything they do on the computer. File/ folder Monitor Keylogger monitors all files and folder activity such as changes in name, size, content, new files and folders created. Thus you will always know what has happened on your computer lately.
5.
6.
7.
8.
17
These were some of the common Features of a working keylogger, now let us see what are the benefits of using a keylogger.
ADVANTAGES OF A KEYLOGGER
Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including: Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content; Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of virtual cheating;
Company security: tracking the use of computers for non-workrelated purposes, or the use of workstations after hours; using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed; Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers; However, the justifications listed above are more subjective than objective; the situations can all be resolved using other methods. Additionally, any legitimate keylogging program can still be used with malicious or criminal intent. Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose. Furthermore, many keyloggers hide themselves in the system (i.e. they have rootkit functionality), which makes them fullyfledged Trojan programs. As such programs are extensively used by cyber criminals,
18
detecting them is a priority for antivirus companies. Kaspersky Labs malware classification system has a dedicated category for malicious programs with keylogging functionality: Trojan-Spy. Trojan-Spy programs, as the name suggests, track user activity, save the information to the users hard disk and then forward it to the author or master of the Trojan. The information collected includes keystrokes and screen-shots, used in the theft of banking data to support online fraud.
HOW TO PROTECT YOURSELF FROM KEYLOGGERS ? Most antivirus companies have already added known keyloggers to their databases, making protecting against keyloggers no different from protecting against other types of malicious program: install an antivirus product and keep its database up to date. However, since most antivirus products classify keyloggers as potentially malicious, or potentially undesirable programs, users should ensure that their antivirus product will, with default settings, detect this type of malware. If not, then the product should be configured accordingly, to ensure protection against most common keyloggers. Lets take a closer look at the methods that can be used to protect against unknown keyloggers or a keylogger designed to target a specific system. Since the chief purpose of keyloggers is to get confidential data (bank card numbers, passwords, etc.), the most logical ways to protect against unknown keyloggers are as follows: 1. using one-time passwords or two-step authentication, 2. using a system with proactive protection designed to detect keylogging software, 3. using a virtual keyboard. Using a one-time password can help minimize losses if the password you enter is intercepted, as the password generated
19
can be used one time only, and the period of time during which the password can be used is limited. Even if a one-time password is intercepted, a cyber criminal will not be able to use it in order to obtain access to confidential information. In order to get one-time passwords, you can use a special device such as: 1. a USB key (such as Aladdin eToken NG OTP):
In order to generate one-time passwords, you can also use mobile phone text messaging systems that are registered with the banking system and receive a PIN-code as a reply. The PIN is then used together with the personal code for authentication. If either of the above devices is used to generate passwords, the procedure is as described below: 1. the user connects to the Internet and opens a dialogue box where personal data should be entered; 2. the user then presses a button on the device to generate a one-time password, and a password will appear on the devices LCD display for 15 seconds;
20
3. the user enters his user name, personal PIN code and the generated one-time password in the dialogue box (usually the PIN code and the key are entered one after the other in a single pass code field); 4. the codes that are entered are verified by the server, and a decision is made whether or not the user may access confidential data. When using a calculator device to generate a password, the user will enter his PIN code on the device 'keyboard' and press the ">" button. One-time password generators are widely used by banking systems in Europe, Asia, the US and Australia. For example, Lloyds TSB, a leading bank, decided to use password generators back in November 2005. In this case, however, the company has to spend a considerable amount of money as it had to acquire and distribute password generators to its clients, and develop/ purchase the accompanying software. A more cost efficient solution is proactive protection on the client side, which can warn a user if an attempt is made to install or activate keylogging software.
21
The main drawback of this method is that the user is actively involved and has to decide what action should be taken. If a user is not very technically experienced, s/he might make the wrong decision, resulting in a keylogger being allowed to bypass the antivirus solution. However, if developers minimize user involvement, then keyloggers will be able to evade detection due to an insufficiently rigorous security policy. However, if settings are too stringent, then other, useful programs which contain legitimate keylogging functions might also be blocked. The final method which can be used to protect against both keylogging software and hardware is using a virtual keyboard. A virtual keyboard is a program that shows a keyboard on the screen, and the keys can be 'pressed' by using a mouse. The idea of an on-screen keyboard is nothing new - the Windows operating system has a built-in on-screen keyboard that can be launched as follows: Start > Programs > Accessories > Accessibility > On-Screen Keyboard.
However, on-screen keyboards arent a very popular method of outsmarting keyloggers. They were not designed to protect against cyber threats, but as an accessibility tool for disabled users. Information entered using an on-screen keyboard can easily be intercepted by a malicious program. In order to be used to protect against keyloggers, on-screen keyboards have to be specially designed in order to ensure that information entered or transmitted via the on-screen keyboard cannot be intercepted.
22
CONCLUSIONS
This article has provided an overview of how keyloggers both keylogging software and hardware - function and is used.
Even though keylogger developers market their products as legitimate software, most keyloggers can be used to steal personal user data and in political and industrial espionage. At present, keyloggers together with phishing and social engineering methods are one of the most commonly used methods of cyber fraud. IT security companies have recorded a steady increase in the number of malicious programs that have keylogging functionality. Reports show that there is an increased tendency to use rootkit technologies in key-logging software, to help the keylogger evade manual detection and detection by antivirus solutions. Only dedicated protection can detect that a keylogger is being used for spy purposes. The following measures can be taken to protect against keyloggers:
o
use a standard antivirus that can be adjusted to detect potentially malicious software (default settings for many products); proactive protection will protect the system against new ,modifications of existing keyloggers; use a virtual keyboard or a system to generate onetime passwords to protect against keylogging software and hardware
With this Perspective we conclude the following report based on the WORKING OF A KEYLOGGER.
23
REFRENCES
1. The Evolution of Malicious IRC Bots. Symantec. 2005-11-26. pp. 2324. Retrieved 2011-03-25. 2. Jonathan Brossard (2008-09-03) (PDF). Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attaks against x86 preboot authentiation software). Iviz Technosolutions. Retrieved 2008-09-23. 3. Microsoft. "EM_GETLINE Message()". Microsoft. Retrieved 2009-07-15. 4. "Apple keyboard hack". Apple keyboard hack. Digital Society. Retrieved 9 June 2011. "Keyghost". keyghost.com. Retrieved 2009-04-19.
5.
"Keylogger Removal". Keylogger Removal. SpyReveal Anti Keylogger. Retrieved 25 April 2011. Jeremy Kirk (2008-12-16). "Tampered Credit Terminals". IDG News Service. Retrieved 2009-04-19. Card
6.
7.
Andrew Kelly (2010-09-10). "Cracking Passwords using Keyboard Acoustics and Language Modeling". Berkeley.edu "Remote monitoring uncovered by American techno activists". ZDNet. 2000-10-26. Retrieved 2008-09-23.
8.
24