SlideShare a Scribd company logo
Technophiles

   A seminar on
computer security
  and protection
Contents


Hacking with ROOT KITS

 •   What is a Rootkit?
 •   Different types of rootkits
 •   Importance
 •   Magnitude of damage
 •   Counter measures


Hacking with Key loggers

 •   What are Key loggers?
 •   Different types of Key loggers
 •   Magnitude of damage
 •   Counter measures
ROOT KITS
If you cannot win the game

CHANGE THE GAME ITSELF!
What are Root kits?
 Root   kits are software which give
  privileged(admin) access to computer
  systems hiding themselves from actual
  administrators changing the rules of kernel
  and modify the way by which the
  operating system loads.
 As you or me can only change or delete
  what we see….It is not possible for us to
  find a trace of root kit installed on our
  system.
Different types
•   User mode
•   Kernel mode
•   Bootkits
•   Hypervisor level
•   Hardware type
Bootkits
   These are a type of root kit which are
    designed to modify the boot process of
    operating systems.
   They are used to attack full disk encryptions
    systems and bypass windows password
    system and thus gain administrator access.
   Now, we are going to show you functioning of
    a bootkit and are going to bypass a windows
    password protected account.
Surprised??
 Yeah,  now you know that your systems
  are not safe , But don’t worry .. We are not
  going to reveal the name of the bootkit
  we just used to ensure that neither your
  pc is hacked nor you would hack your
  friend’s…. ;-)
 But people who are sincerely interested in
  hacking others computers may find it on
  the internet.
   Many of the times
    when our PC gets
    infected with virus’
    we do an antivirus
    scan.
   While most of the
    time this may fix
    the problem,
    sometimes it           Counter
    doesn’t.               Measures
   That implies that      Ways to fight Rootkits
    your system is
    infected with a
    rootkit virus and
    that you have to
    run a rootkit scan.
Detection and Removal of a ROOTKIT
   Many Rootkits are very
    difficult to detect by
    operating system mode
    programs which include
    antivirus’
   Such type of rootkits can
    be detected by booting
    from an alternate medium
    and running a rootkit scan.
   There are many other
    advanced detection
    systems for rootkits. Hackers
    who write rootkit codes
    target big companies and
    celebs for stealing data
    and for other financial
    gains.
   McAfee’s Rookit
    Detective
   Sophos Anti-
    Rootkit [Free]
   RootRepeal -
    Rootkit Detector
   Kaspersky Virus
    Removal Tool
   Microsoft
    Malicious Software
    Removal Tool
   Panda Anti-Rootkit
    and latest USB
    vaccine
   Sysinternals Rootkit
    Revealer [for          Removal tools for
    advanced users]        Rootkits
Key
Loggers
Record and submit…

EVERYTHING!!
 Key loggers track
  the keys struck on
  keyboard, mostly in
  a covert manner so
  that the user typing
  the keys is unaware
  that their actions
  are monitored.
 Some key loggers       Key loggers
  can even take          Key = information
  screenshots and        Log = Keep a record of
  access information     Different types:
  copied to the          Software based
  clipboard              Hardware based
 Malware based:
A key logger can be
present inside a virus
 Kernel based:
Key logger written as a
rootkit that has direct
access to computer
hardware                  Software based
 Others:                 Key loggers
These include key         Mainly three types:
                          • Malware based
loggers which are API
                          • Kernel based
based, Grabber based      • API based
and Packet analyzers.
 Firmware based:
A software is loaded in
to BIOS to keep track
of key strokes.
 Keyboard Hardware:
A hardware is
attached between          Hardware based
keyboard and main         key loggers
system to record all      Out in the open!!
that is typed on the
keyboard.
This explains…
Magnitude and type of damage
A   software key logger can be installed
  remotely and can send back the logged
  information to a particular ip address or
  an e-mail or can broadcast data in
  different methods so that it would reach
  the hacker without being traced.
 Hardware key loggers generally contain
  memory in which they store the logged
  information. This needs user’s physical
  access to the system which is risky
 Once   the
 hacker obtains
 the clear
 text, he can
 easily trace
 down the
 password and
 id’s of the
 target user and
 hence can steal
 or modify data
 and cause loss
 to the target.
Counter Measures



• Using a good antivirus or anti spyware
• Using a KEY SCRAMBLER
    This is very useful as it encrypts information that is typed on
keyboard . In this way, even if the hacker plants a spyware, He will
have nothing but a computer code to decipher.
• Using an ANTILOGGER
     This is also a good method to fight key loggers . These are the
programs that detect Key loggers by their behavior and report them
to the user.
D-Cipher

More Related Content

ODP
What is keylogger
PPTX
Keyloggers
PDF
Understanding Keylogger
PPT
Spywares & Keyloggers
PPT
Keyloggers
PPT
Keyloggers and Spywares
PPTX
Hardware key logger
PDF
Research Paper on Rootkit.
What is keylogger
Keyloggers
Understanding Keylogger
Spywares & Keyloggers
Keyloggers
Keyloggers and Spywares
Hardware key logger
Research Paper on Rootkit.

What's hot (20)

PPT
Rootkit
PDF
Web backdoors attacks, evasion, detection
PPTX
PPTX
ETHICAL HACKING BY HRITIK JAGE
PDF
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
PDF
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
PDF
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
PPTX
Firmware analysis 101
PPTX
Penetration testing
 
PDF
Beginners guide on how to start exploring IoT 2nd session
PPTX
Basics of hacking
PDF
IoT security zigbee -- Null Meet bangalore
PPT
Computer security: hackers and Viruses
PPTX
Lannguyen-Detecting Cyber Attacks
PPTX
PPTX
Cyber Security Tricks One Should Know
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPTX
Ethical hacking
PPTX
Rootkit
Web backdoors attacks, evasion, detection
ETHICAL HACKING BY HRITIK JAGE
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
[IJCT-V3I2P25] Authors: Mr.S.Jagadeesan,M.Sc, MCA., M.Phil., ME[CSE]., S.Rubiya
Firmware analysis 101
Penetration testing
 
Beginners guide on how to start exploring IoT 2nd session
Basics of hacking
IoT security zigbee -- Null Meet bangalore
Computer security: hackers and Viruses
Lannguyen-Detecting Cyber Attacks
Cyber Security Tricks One Should Know
Virus and its CounterMeasures -- Pruthvi Monarch
Ethical hacking
Ad

Similar to D-Cipher (20)

PPTX
ransomware keylogger rootkit.pptx
PPTX
Keyloger & spyware
PDF
Bypass_AV-EDR.pdf
PPTX
Unit 5 - Windows Credential Attacks.pptx
PPT
ETHICAL HACKING
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
PPTX
Information security & EthicalHacking
PPTX
Security Threats and Vulnerabilities-2.pptx
PPTX
Ways to protect From Keyloggers!
PPTX
Introduction to Malwares
PDF
Key Logging.pptx.pdf
PPT
Rootkit Hunting & Compromise Detection
PDF
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPTX
Security threats explained
PDF
Module3 Cyber Security on terrorist and cyber criminal.pdf
PDF
CH1- Introduction to malware analysis-v2.pdf
PDF
43 automatic
PPTX
Botnets Attacks.pptx
PPTX
Anti Virus Software
ransomware keylogger rootkit.pptx
Keyloger & spyware
Bypass_AV-EDR.pdf
Unit 5 - Windows Credential Attacks.pptx
ETHICAL HACKING
Unit 6_keylogger_Spywares_virus_worms.pdf
Information security & EthicalHacking
Security Threats and Vulnerabilities-2.pptx
Ways to protect From Keyloggers!
Introduction to Malwares
Key Logging.pptx.pdf
Rootkit Hunting & Compromise Detection
[CB19] tknk_scanner v2:community-based integrated malware identification syst...
Hacktrikz - Introduction to Information Security & Ethical Hacking
Security threats explained
Module3 Cyber Security on terrorist and cyber criminal.pdf
CH1- Introduction to malware analysis-v2.pdf
43 automatic
Botnets Attacks.pptx
Anti Virus Software
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
master seminar digital applications in india
PPTX
Cell Types and Its function , kingdom of life
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Lesson notes of climatology university.
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Pharma ospi slides which help in ospi learning
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Complications of Minimal Access Surgery at WLH
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
VCE English Exam - Section C Student Revision Booklet
Supply Chain Operations Speaking Notes -ICLT Program
master seminar digital applications in india
Cell Types and Its function , kingdom of life
Microbial diseases, their pathogenesis and prophylaxis
A systematic review of self-coping strategies used by university students to ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Lesson notes of climatology university.
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Pharma ospi slides which help in ospi learning
Yogi Goddess Pres Conference Studio Updates
Complications of Minimal Access Surgery at WLH
Microbial disease of the cardiovascular and lymphatic systems
Chinmaya Tiranga quiz Grand Finale.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
VCE English Exam - Section C Student Revision Booklet

D-Cipher

  • 1. Technophiles A seminar on computer security and protection
  • 2. Contents Hacking with ROOT KITS • What is a Rootkit? • Different types of rootkits • Importance • Magnitude of damage • Counter measures Hacking with Key loggers • What are Key loggers? • Different types of Key loggers • Magnitude of damage • Counter measures
  • 3. ROOT KITS If you cannot win the game CHANGE THE GAME ITSELF!
  • 4. What are Root kits?  Root kits are software which give privileged(admin) access to computer systems hiding themselves from actual administrators changing the rules of kernel and modify the way by which the operating system loads.  As you or me can only change or delete what we see….It is not possible for us to find a trace of root kit installed on our system.
  • 5. Different types • User mode • Kernel mode • Bootkits • Hypervisor level • Hardware type
  • 6. Bootkits  These are a type of root kit which are designed to modify the boot process of operating systems.  They are used to attack full disk encryptions systems and bypass windows password system and thus gain administrator access.  Now, we are going to show you functioning of a bootkit and are going to bypass a windows password protected account.
  • 7. Surprised??  Yeah, now you know that your systems are not safe , But don’t worry .. We are not going to reveal the name of the bootkit we just used to ensure that neither your pc is hacked nor you would hack your friend’s…. ;-)  But people who are sincerely interested in hacking others computers may find it on the internet.
  • 8. Many of the times when our PC gets infected with virus’ we do an antivirus scan.  While most of the time this may fix the problem, sometimes it Counter doesn’t. Measures  That implies that Ways to fight Rootkits your system is infected with a rootkit virus and that you have to run a rootkit scan.
  • 9. Detection and Removal of a ROOTKIT  Many Rootkits are very difficult to detect by operating system mode programs which include antivirus’  Such type of rootkits can be detected by booting from an alternate medium and running a rootkit scan.  There are many other advanced detection systems for rootkits. Hackers who write rootkit codes target big companies and celebs for stealing data and for other financial gains.
  • 10. McAfee’s Rookit Detective  Sophos Anti- Rootkit [Free]  RootRepeal - Rootkit Detector  Kaspersky Virus Removal Tool  Microsoft Malicious Software Removal Tool  Panda Anti-Rootkit and latest USB vaccine  Sysinternals Rootkit Revealer [for Removal tools for advanced users] Rootkits
  • 12.  Key loggers track the keys struck on keyboard, mostly in a covert manner so that the user typing the keys is unaware that their actions are monitored.  Some key loggers Key loggers can even take Key = information screenshots and Log = Keep a record of access information Different types: copied to the Software based clipboard Hardware based
  • 13.  Malware based: A key logger can be present inside a virus  Kernel based: Key logger written as a rootkit that has direct access to computer hardware Software based  Others: Key loggers These include key Mainly three types: • Malware based loggers which are API • Kernel based based, Grabber based • API based and Packet analyzers.
  • 14.  Firmware based: A software is loaded in to BIOS to keep track of key strokes.  Keyboard Hardware: A hardware is attached between Hardware based keyboard and main key loggers system to record all Out in the open!! that is typed on the keyboard.
  • 16. Magnitude and type of damage A software key logger can be installed remotely and can send back the logged information to a particular ip address or an e-mail or can broadcast data in different methods so that it would reach the hacker without being traced.  Hardware key loggers generally contain memory in which they store the logged information. This needs user’s physical access to the system which is risky
  • 17.  Once the hacker obtains the clear text, he can easily trace down the password and id’s of the target user and hence can steal or modify data and cause loss to the target.
  • 18. Counter Measures • Using a good antivirus or anti spyware • Using a KEY SCRAMBLER This is very useful as it encrypts information that is typed on keyboard . In this way, even if the hacker plants a spyware, He will have nothing but a computer code to decipher. • Using an ANTILOGGER This is also a good method to fight key loggers . These are the programs that detect Key loggers by their behavior and report them to the user.