From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Methodology of keystroke logging

Methodology of keystroke logging

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Methodology of keystroke logging

- [Voiceover] Keylogging is used for a number of different reasons. Company security, parental control, and schools use it to monitor Internet usage. A keylogger quietly records all activity including what you put in a word document, email, online chats, and Internet use. Because a keylogger records all keystrokes, you can see the name and password in plain text as someone types it into a form. In addition, if using secure email, such as GNU Privacy Guard, when using a keylogger, you'll be able to see the email before encryption. When reporting, you can set it up to send it via email, FTP, or the results can be stored on a computer. However, the results will need to be interpreted. I ran a quick scan in Actual Keylogger and here we can see the results. Some software will remove the keystrokes recorded during the creation of the word doc or notepad or form, but in this case, I just put them in so you can see what happens and what it is recording. So here's an actual keylogger report…

Contents