hackingComputer and Hacking Forensics Course

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

This topic contains 11 replies, has 10 voices, and was last updated by  vgupta451 2 years, 6 months ago.

Viewing 12 posts - 1 through 12 (of 12 total)
  • Author
    Posts
  • #16877

    santu143
    Participant

    what are keyloggers ..?

    #16882

    sitanshu
    Participant

    keylogger are such software who will use for getting acess of victim data.one it install,it can send many data as their logging account ,screenshot,voice recording and many more…

    #16893

    }Capt._Long_Dongle{
    Participant

    Generally, a keylogger will do just that. Log keys, or keystrokes so the attacker can determine usernames, passwords, browsing habits (and logins for those). Some can also track mouse movements, operate cameras, microphones etc. I’ve used them in the past to monitor my daughters browsing habits as she had found a way around the parental controls and I wanted to know how. They tend to work well with social engineering attacks as the file sizes are small and the install is very silent (if done right).

    #16894

    mr_clark
    Moderator

    Keyloggers can also be hardware based where you plug the keylogger dongle into the keyboard port (USB or PS/2) and then plug the keyboard into the dongle. Later on you go back and pull out the dongle and view all the keystrokes the user did. Fairly high risk for the attacker as they can get caught when installing or removing the keylogger. But once installed hard to detect unless your users actually look at the back of their computer cases on a regular basis.

    Some hardware keyloggers also have wireless so you don’t have to remove the device to get at the data.

    https://en.wikipedia.org/wiki/Hardware_keylogger

    #17614

    Amir
    Participant

    You can use each website on this list to make money online using your skills with Wireshark and many
    other related skills!
    1. https://www.odesk.com/
    2. https://www.elance.com/
    3. https://www.codementor.io/
    4. https://www.freelancer.com/
    5. https://www.project4hire.com/
    6. http://www.guru.com/
    7. http://www.peopleperhour.com/
    8. http://www.getacoder.com/
    9. http://www.craigslist.org/

    #18429

    Amir
    Participant

    Don’t Name Your Dog After Your Password!
    When creating passwords remember that you should avoid using things that are personal to you and that could be easy for a hacker to find out about you. Things like your pet’s name, maiden name, birthday, name of your high school and child’s name can be easily found on social networks, making it even easier for hackers to crack your passwords.
    Here are some other great tips to make sure that your passwords are strong and protected:
    Make sure your passwords are at least eight characters long and include numbers, letters and characters that don’t spell anything.
    Use different passwords for separate accounts, especially for banking and other high-value websites.
    Change your passwords frequently.
    source : http://robertsiciliano.com

    • This reply was modified 4 years, 11 months ago by  Amir.
    #18501

    SecurityGurl
    Participant

    It’s nearly impossible to defeat a hardware logger as there is no software that can detect a connection of the logger. Even via device manager it is hidden as a keyboard device. Years ago I was asked to audit a bank and they asked me to hack into the bank without touching foot inside or using any sort of server attacks.. So I thought easy.. I got a USB blank circuit stick then modified it to a keylogger and also added bluetooth with a extended range to it up to 20 meters. I then exploited the smokers. I placed 4 of these usb sticks in fake packaging all sealed up on the ground near where the banks smokers were and also put one on the managers car window as a freebie for advertisement. Of course human minds being stupid they took the usb’s and plugged them into the banks systems which in turn I got all the passwords for staff members and even the technical support team and network administrator which when i did my report they felt stupid for picking up the usb sticks but how were they to know they had a hardware keylogger considering the virus scanners they had couldn’t pick it up.

    #21952

    Williams Knight
    Participant

    sorry i am sort of new to hacking but i am ready to learn if any one cares to teach me

    #89985

    zezoaj
    Participant

    23451451254745414244`3454513445284451234134513745137451234513541645342345345137413455/hack roblox usename:razan
    3641523413542354614534345275345134512451264514183745345236413221541534546356434354524634623443512134234451234523645124653464512634532465234625134656416641365461566347568347346523576324577672562357657432567256756456234753573572653485238456345635724376573425184234561`2384617219325685t138135433655237561351650136156413514365435655465813465195-174846761571423541635417243
    =61247354126345123486131426666666666666666687645345123451234651234612534853248146732
    631254736487326456512342364254_y76ryq7+8746175143528756275134=165164551665535561745623656245564632656257823572655524625664+72464516345747457451746374645761675641357371853447123461t32443451234526341873246632466234632847821461347328t376p878757=7243r92345435r37563875623523457823465732456238745613956234756e273465713465234573642879999999999999999999999999999999999999999999999999999999999999573265273465723657256237465735623576347562345623455463472562387456347562754632564617513617877764172675325465289345849523475672345623756235763254

    #89986

    zezoaj
    Participant

    23451451254745414244`3454513445284451234134513745137451234513541645342345345137413455/hack roblox usename:razan
    3641523413542354614534345275345134512451264514183745345236413221541534546356434354524634623443512134234451234523645124653464512634532465234625134656416641365461566347568347346523576324577672562357657432567256756456234753573572653485238456345635724376573425184234561`2384617219325685t138135433655237561351650136156413514365435655465813465195-174846761571423541635417243
    =61247354126345123486131426666666666666666687645345123451234651234612534853248146732
    631254736487326456512342364254_y76ryq7+8746175143528756275134=165164551665535561745623656245564632656257823572655524625664+72464516345747457451746374645761675641357371853447123461t32443451234526341873246632466234632847821461347328t376p878757=7243r92345435r37563875623523457823465732456238745613956234756e273465713465234573642879999999999999999999999999999999999999999999999999999999999999573265273465723657256237465735623576347562345623455463472562387456347562754632564617513617877764172675325465289345849523475672345623756235763254`3561614t2374y5t234y513t4573145536135126471673657136452635614353645187346164761347174562475643752356274356/hack/.exe715134563745613414661453576134516345143571435r1347851349857134651384756187465274352345634267r65341756871!#$%
    !#$%^@%#^@!#^&%$#Q%^&@#!@#$%#@%#73467366246273657357@$#%@%$#%^@#^$!645123746523654736572646157634756273456234856235346573264375254!$#%^@%$&#$@&*%()$%^&*(&%^$#@!#784261454538475384563456437dg7qtr3dteg436qwgfri7852oooooo6244362345146478214527463746234324872346324154732643724623746237894361274127641293462378416934612364926397423672347193134327463274329141293746231746341263745560902143964 1845325417353415324523147851234854361276124o813746`o641132746721462387964i1327

    #107120

    shaibu1238
    Participant

    Whoaaaaa that’s smart of you 👌🏽

    #108951

    vgupta451
    Participant

    KEY LOGGER record keystrokes of input given by a user and send those inputted information to a specifed location (email or a directory)

Viewing 12 posts - 1 through 12 (of 12 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel