SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
Keyloger & Spyware
B.E Semester 5th
(E.C Department)
Enroll No. Name.
150600111012 Kashif Khan
Keylogger
What is Keylogger?
• A keylogger is a program that runs in the
background or hardware, recording all the
keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped
raw to the attacker
• Attacker checks files carefully in the hopes of either
finding passwords, or possibly other useful
information.
Type of Keylogger?
1. Hardware-based keylogger
2. Software-based keylogger
Hardware-based keylogger?
Hardware keyloggers are used for keystroke logging, a
method of capturing and recording computer users'
keystrokes, including sensitive passwords. They can
be implemented via BIOS-level firmware, or
alternatively, via a device plugged inline between a
computer keyboard and a computer.
Hardware-based Keylogger
Software-based Keylogger?
A keylogger is a type of surveillance
software that has the capability to record
every keystroke you make to a log file,
usually encrypted. A keylogger recorder can
record instant messages, e-mail, and any
information you type at any time using your
keyboard.
Type of software-based Keylogger
• Kernal-based Keylogger
• API-based Keyloger
• Java script-based Keylogger
• Memory-based Keylogger
• Hipervisior-based Keylogger
• Grabbing-based Keylogger
Spyware
What is Spyware?
• Spyware is software that aims to gather
information about a person or organization without
their knowledge, that may send such information
to another entity without the consumer's consent,
or that asserts control over a device without the
consumer's knowledge.
• Applications that send information from your
computer to the creator of the spyware
• Sometimes consists of an apparent core
functionality and a hidden functionality of
information gathering (Trojan)
• Can be used by web sites for marketing information,
to determine their stance with regard to competitors
and market trends
Types of Spy ware
• Web Bugs
• Ad Ware
• Stand alone Surveillance Software
• Key Loggers
Web Bugs
• Cookies keep track of your
activity
• Ability to download spy ware
components
• Direct you to WebPages that
target your interests
Ad Ware
• Software installed with the help of Ad
supported programs
• Tracks your internet activity to send you
pop ups that target your interests
• May sell your information to companies
Surveillance
• Monitors computer tasks
• Access personal information
• Legal for Employers
• Used in Identity Theft
Keyloggers
• Were originally designed to record all
keystrokes of users in order to find
passwords, credit card numbers, and other
sensitive information
Prevention
• Antivirus software
• Keep Updated
• Beware of Peer to Peer file sharing
• Be sure of the source and contents of all
downloads and updates
• FireWalls
Conclusion
• Spy ware is always watching….
• Protect yourself, your bank accounts,
and your computer.
Thank you

More Related Content

PPTX
Password Cracking
PDF
Anatomy of a cyber attack
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Cyber Forensics Module 2
PPT
Linux forensics
PDF
Ransomware attacks
PDF
Hunting Lateral Movement in Windows Infrastructure
PPTX
Malware forensic
Password Cracking
Anatomy of a cyber attack
Cybersecurity 1. intro to cybersecurity
Cyber Forensics Module 2
Linux forensics
Ransomware attacks
Hunting Lateral Movement in Windows Infrastructure
Malware forensic

What's hot (20)

PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPT
Virus and Malicious Code Chapter 5
PPTX
Authentication vs authorization
PPTX
Network forensics and investigating logs
PPTX
Network security
PPTX
Password Attack
PPT
PDF
Super Easy Memory Forensics
 
PPTX
Password craking techniques
PDF
File000152
PPTX
Computer security and
PPT
Keyloggers
PDF
Autopsy 3.0 - Open Source Digital Forensics Conference
PPTX
Introduction to Malware Analysis
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
My darkweb-presentation
PPTX
System hacking
 
PPTX
Cyber security
PPT
Registry forensics
PPT
Internet Security
Presentation of Social Engineering - The Art of Human Hacking
Virus and Malicious Code Chapter 5
Authentication vs authorization
Network forensics and investigating logs
Network security
Password Attack
Super Easy Memory Forensics
 
Password craking techniques
File000152
Computer security and
Keyloggers
Autopsy 3.0 - Open Source Digital Forensics Conference
Introduction to Malware Analysis
Inetsecurity.in Ethical Hacking presentation
My darkweb-presentation
System hacking
 
Cyber security
Registry forensics
Internet Security
Ad

Similar to Keyloger & spyware (20)

PPT
Keyloggers and Spywares
PDF
Key Logging.pptx.pdf
PPTX
secure from Phishing Hacking and Keylogger
PPTX
Keyloggers
PDF
Understanding Keylogger
PPTX
PPTX
ransomware keylogger rootkit.pptx
PPTX
Unit 5 - Windows Credential Attacks.pptx
PPTX
Protection from hacking attacks
PPT
Keyloggers.ppt
PPTX
Ways to protect From Keyloggers!
PPTX
spyware
PPT
Malware forensics
PPTX
Malware ppt final.pptx
PPTX
Introduction to cyber security
PPTX
Security problems.pptx
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
PPTX
PoS Malware and Other Threats to the Retail Industry
PPTX
Hacking By Nirmal
PPTX
Senior Technology Education
Keyloggers and Spywares
Key Logging.pptx.pdf
secure from Phishing Hacking and Keylogger
Keyloggers
Understanding Keylogger
ransomware keylogger rootkit.pptx
Unit 5 - Windows Credential Attacks.pptx
Protection from hacking attacks
Keyloggers.ppt
Ways to protect From Keyloggers!
spyware
Malware forensics
Malware ppt final.pptx
Introduction to cyber security
Security problems.pptx
Unit 6_keylogger_Spywares_virus_worms.pdf
PoS Malware and Other Threats to the Retail Industry
Hacking By Nirmal
Senior Technology Education
Ad

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Institutional Correction lecture only . . .
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Types and Its function , kingdom of life
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
Basic Mud Logging Guide for educational purpose
human mycosis Human fungal infections are called human mycosis..pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Complications of Minimal Access Surgery at WLH
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Institutional Correction lecture only . . .
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
O7-L3 Supply Chain Operations - ICLT Program
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Microbial disease of the cardiovascular and lymphatic systems
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Keyloger & spyware

  • 1. Keyloger & Spyware B.E Semester 5th (E.C Department) Enroll No. Name. 150600111012 Kashif Khan
  • 2. Keylogger What is Keylogger? • A keylogger is a program that runs in the background or hardware, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker • Attacker checks files carefully in the hopes of either finding passwords, or possibly other useful information.
  • 3. Type of Keylogger? 1. Hardware-based keylogger 2. Software-based keylogger Hardware-based keylogger? Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They can be implemented via BIOS-level firmware, or alternatively, via a device plugged inline between a computer keyboard and a computer.
  • 5. Software-based Keylogger? A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.
  • 6. Type of software-based Keylogger • Kernal-based Keylogger • API-based Keyloger • Java script-based Keylogger • Memory-based Keylogger • Hipervisior-based Keylogger • Grabbing-based Keylogger
  • 7. Spyware What is Spyware? • Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.
  • 8. • Applications that send information from your computer to the creator of the spyware • Sometimes consists of an apparent core functionality and a hidden functionality of information gathering (Trojan) • Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends
  • 9. Types of Spy ware • Web Bugs • Ad Ware • Stand alone Surveillance Software • Key Loggers
  • 10. Web Bugs • Cookies keep track of your activity • Ability to download spy ware components • Direct you to WebPages that target your interests
  • 11. Ad Ware • Software installed with the help of Ad supported programs • Tracks your internet activity to send you pop ups that target your interests • May sell your information to companies
  • 12. Surveillance • Monitors computer tasks • Access personal information • Legal for Employers • Used in Identity Theft
  • 13. Keyloggers • Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information
  • 14. Prevention • Antivirus software • Keep Updated • Beware of Peer to Peer file sharing • Be sure of the source and contents of all downloads and updates • FireWalls
  • 15. Conclusion • Spy ware is always watching…. • Protect yourself, your bank accounts, and your computer.