In this video Lisa Bock explains the uses for Keylogging: to ensure company security, at home for parental control, and in schools to monitor internet usage. Dive into a Keylogging report to see how each keystroke is logged and step through websites visited, forms filled out, and text being typed in notepad.
- [Voiceover] Keylogging is used for a number of different reasons. Company security, parental control, and schools use it to monitor Internet usage. A keylogger quietly records all activity including what you put in a word document, email, online chats, and Internet use. Because a keylogger records all keystrokes, you can see the name and password in plain text as someone types it into a form.
In addition, if using secure email, such as GNU Privacy Guard, when using a keylogger, you'll be able to see the email before encryption. When reporting, you can set it up to send it via email, FTP, or the results can be stored on a computer. However, the results will need to be interpreted. I ran a quick scan in Actual Keylogger and here we can see the results. Some software will remove the keystrokes recorded during the creation of the word doc or notepad or form, but in this case, I just put them in so you can see what happens and what it is recording.
So here's an actual keylogger report. You can see that there was websites that were visited. Went to the weather station. Downloaded Firefox. Installed Firefox. Then Firefox was run. I'll scroll down here. On keystrokes, we can see keystrokes and it asked for me to register so down, right here, you can see it said Jasper@patra.com, Roxy42, RoxyCleo.
That could be, maybe, my user name and password, so you can apply that when you're seeing that information. Went down a little bit farther here and here we can see that we opened up Notepad and then, all the way at the bottom, you can see there I typed, "I feel like I'm being watched." So, you can see that keystroke logging does a number of things as far as monitoring every keystroke we put into the system, however the results will need to be interpreted, but everything is recorded.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks