In this video Lisa Bock explains the uses for Keylogging: to ensure company security, at home for parental control, and in schools to monitor internet usage. Dive into a Keylogging report to see how each keystroke is logged and step through websites visited, forms filled out, and text being typed in notepad.
- View Offline
- [Voiceover] Keylogging is used…for a number of different reasons.…Company security,…parental control,…and schools use it to monitor Internet usage.…A keylogger quietly records all activity…including what you put in a word document,…email, online chats, and Internet use.…Because a keylogger records all keystrokes,…you can see the name and password…in plain text as someone types it into a form.…
In addition, if using secure email,…such as GNU Privacy Guard,…when using a keylogger,…you'll be able to see the email before encryption.…When reporting, you can set it up…to send it via email,…FTP, or the results can be stored on a computer.…However, the results will need to be interpreted.…I ran a quick scan in Actual Keylogger…and here we can see the results.…Some software will remove the keystrokes recorded…during the creation of the word doc or notepad or form,…but in this case,…I just put them in so you can see what happens…and what it is recording.…
So here's an actual keylogger report.…You can see that there was websites…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks