A software keystroke logger runs in the background and can capture and record every keystroke, any print activity, and any web pages visited. Reports can be run or even sent via email, through the network or by FTP. In this video, Lisa Bock demonstrates ActualKeylogger, to capture screen activity and via the resultant report.
- [Voiceover] A software keystroke logger can monitor and log all types of activity that's happening on the screen. I'll do a simple example of a keystroke logger, but first, we're going to have to go get some software. I'm at the website, ActualKeylogger, where you can download a free trial, and install it and run it yourself. I've already downloaded this, but you can read a little bit more about what it can do for you. Here we can see some of the Keylogger software features, now you can take a look at what it's going to do in the background it's going to say which applications are run, which ones are closed, all the keystrokes that are pressed, anything that's copied to the keyboard, any print activity, any internet connections and all websites that are visited, so you can see behind the scenes what is being captured.
I've brought up Actual Keylogger, just take a look at some of the options. We haven't started to monitor, but when I'm ready, I'll click that. You can see it will monitor PC activity, any internet activity, any reports then when we're done, and I will then go through and run a report, and then here is our settings, and it tells us a little bit about how much of the file it takes up. The logs, and then at the end we can see the report sending. Now, in this case, you can see that it actually can send reports via email, or the local network, or an FTP.
I would be hesitant to do this, only because it's going to create more noise, if you do any report sending. When I go back to logs, I'm going to ask that we save the characters only, because if we see in the reports all of the keystrokes, it gets a little hard to read. Alright, I have Keylogger open, and I have Notepad open, we will start monitoring, and of course, this would be in the background, I wouldn't be able to see this, normally. I'll start typing, then I'll stop monitoring.
Now let's take a look, I will go to report, and now let's take a look, we will create the report, I'm just going to put it on my desktop, so we can take a look at it. And I'll ask to view the report right now. Okay, so we've taken a look, I didn't go anywhere else, and the bottom line is we can see the keystrokes right at the bottom here, I feel like I'm being watched. So you can see that the software keystroke logger does a lot in order to monitor what's happening and monitor every keystroke that is made.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks