SlideShare a Scribd company logo
1 of 23
Download to read offline
SPYWARES
&
KEYLOGGERS
Presented By
JITHIN JAMES

Introduction

What areSpywares?

What areKey loggers?

Demo
Outline
Spywares & Keyloggers
What Are Spywares ?

Applicationsthat send information from your
computer to thecreator of thespyware

Consistsof an corefunctionality and ahidden
functionality of information gathering

Can beused for marketing information, to determine
their stancewith regard to competitorsand market
trends

Can also beused to log keystrokesand send thoseto
whomever
Spywares & Keyloggers
Definition
Spywareissoftware

that aidsin gathering information about a
person or organization

without their knowledge

may send such information to another
entity without theconsumer'sconsent

assertscontrol over acomputer
without theconsumer'sknowledge.
Spyware Symptoms
Themajor symptomsare

reset your browser'shomepage

produceeven moreinvasiveadvertisements

“pop-up” ads

unwanted CPU activity

disk usage

network traffic

applicationsfreezing

failureto boot

system-widecrashes
Spyware Symptoms(Continued)
Types of Spyware
Spywarecan bebroken down into four different
categories:

System monitors

Trojans

Adware

Tracking cookies
System Monitors

Tracking Softwareused to monitor computer activity

keystrokes, e-mails, chat room conversations, instant
messages, Web sitesvisited, programsrun, timespent on
Web sitesor using programs, or user-namesand
passwords.

Theinformation istypically either stored for later
retrieval or transmitted to theremoteprocessor person
employing theMonitor

Key-loggersand Screen Scrapersaretypesof System
Monitors.
Trojans

TrojansHorsesor Trojansaremaliciousprogramsthat appear
asharmlessor even desirableapplications.

Designed to causelossor theft of computer data, and to
destroy your system.

Seven major types

RemoteAccessTrojans

DataSending Trojans

DestructiveTrojans

Proxy Trojans

FTPTrojans

Security SoftwareDisabler Trojans

Denial-of-Serviceattack (DoS) Trojans
Trojans(Continued)
Trojans(Continued)

NotableTrojans

NetbusAdvanceSystem Care(by Carl-Fredrik
Neikter)

Subseven or Sub7(by Mobman)

Back Orifice(Sir Dystic)

Beast

Zeus

Flashback Trojan (Trojan BackDoor.Flashback)

ZeroAccess

Koobface

Vundo
Adware

It isany softwarepackagewhich automatically renders
advertisementsin order to generaterevenuefor itsauthor.

Softwarethat displayspop-up advertisementstuned to the
userscurrent activity, potentially reporting aggregateor
anonymized browsing behavior to athird party

Track personal information (including your age, gender,
location, buying preferences, surfing habits, etc.)
Tracking Cookies

Cookiesthat can track your Web activities

May includecookiesthat contain
• user names
• passwords

other privateinformation that you enter on
web sites(SSN, banking info, credit cards)
Preventive Techniques

Don't install any application unlessyou arecertain of what it
does or where it came from.

Alwaysread thelicenseagreement

Softwareand OSupgrades

Utilizebrowser'ssecurity settings

UseAnti-Spyware

Spy Sweeper

Microsoft WindowsAnti-Spyware

SpywareDoctor

SpywareSlayer

Spy Killer

Spy Remover
What are Keyloggers?

Keystrokelogging, or keyboard capturing

theaction of recording (or logging) thekeys
struck on akeyboard, typically in acovert manner

so that theperson using thekeyboard isunaware
that their actionsarebeing monitored
Typesof Keyloggers
HardwareKeyloggers SoftwareKeyloggers
Installs in 5 seco nds, simply plug
it in.
Requires a passwo rd to lo g into
the co mputer.
Can be installed witho ut lo gging
into the co mputer.
Requires administratio n rights to
install.
Can be remo ved, and the
info rmatio n retrieved o n ano ther
co mputer.
Requires that so ftware be installed
o n the co mputer.
Requires reaching behind the
co mputer to plug the device in.
Can reco rd o perating system
events such as page file size, etc.
HardwareKeylogger
SoftwareKeylogger
Some Examples

Actual Spy Keylogger

Ardamax Keylogger

Ghost Keylogger

Golden Keylogger

HomeKeylogger

InvisibleKeylogger

KGB Keylogger

RemoteKeylogger

Soft Central Keylogger

Stealth Keylogger
DEMO – 1
Actual Spy Keylogger
THANKYOU

More Related Content

What's hot

Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
System hacking
System hackingSystem hacking
System hackingCAS
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Operating system security
Operating system securityOperating system security
Operating system securitySarmad Makhdoom
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationshalini singh
 
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesCyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesGyanmanjari Institute Of Technology
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 

What's hot (20)

Malware
MalwareMalware
Malware
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
System hacking
System hackingSystem hacking
System hacking
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
User authentication
User authenticationUser authentication
User authentication
 
Computer security
Computer securityComputer security
Computer security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Email security
Email securityEmail security
Email security
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Social engineering
Social engineering Social engineering
Social engineering
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Jhon the ripper
Jhon the ripper Jhon the ripper
Jhon the ripper
 
Hash function
Hash function Hash function
Hash function
 
Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber CrimesCyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
Cyber Security - Unit - 4 - Introduction to Cyber Crime and law Cyber Crimes
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 

Viewers also liked

Viewers also liked (10)

Keylogger
KeyloggerKeylogger
Keylogger
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Virtual keyboard ppt
Virtual keyboard pptVirtual keyboard ppt
Virtual keyboard ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Spywares & Keyloggers

Similar to Spywares & Keyloggers (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Spyware
SpywareSpyware
Spyware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
spyware
spywarespyware
spyware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware Is Good
Spyware Is GoodSpyware Is Good
Spyware Is Good
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 

Recently uploaded

Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusSkylark Nobin
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxnaveenithkrishnan
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxjayshuklatrainer
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 

Recently uploaded (15)

Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus Bonus
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptx
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 

Spywares & Keyloggers

  • 4. What Are Spywares ?  Applicationsthat send information from your computer to thecreator of thespyware  Consistsof an corefunctionality and ahidden functionality of information gathering  Can beused for marketing information, to determine their stancewith regard to competitorsand market trends  Can also beused to log keystrokesand send thoseto whomever
  • 6. Definition Spywareissoftware  that aidsin gathering information about a person or organization  without their knowledge  may send such information to another entity without theconsumer'sconsent  assertscontrol over acomputer without theconsumer'sknowledge.
  • 7. Spyware Symptoms Themajor symptomsare  reset your browser'shomepage  produceeven moreinvasiveadvertisements  “pop-up” ads  unwanted CPU activity  disk usage  network traffic  applicationsfreezing  failureto boot  system-widecrashes
  • 9. Types of Spyware Spywarecan bebroken down into four different categories:  System monitors  Trojans  Adware  Tracking cookies
  • 10. System Monitors  Tracking Softwareused to monitor computer activity  keystrokes, e-mails, chat room conversations, instant messages, Web sitesvisited, programsrun, timespent on Web sitesor using programs, or user-namesand passwords.  Theinformation istypically either stored for later retrieval or transmitted to theremoteprocessor person employing theMonitor  Key-loggersand Screen Scrapersaretypesof System Monitors.
  • 11. Trojans  TrojansHorsesor Trojansaremaliciousprogramsthat appear asharmlessor even desirableapplications.  Designed to causelossor theft of computer data, and to destroy your system.  Seven major types  RemoteAccessTrojans  DataSending Trojans  DestructiveTrojans  Proxy Trojans  FTPTrojans  Security SoftwareDisabler Trojans  Denial-of-Serviceattack (DoS) Trojans
  • 13. Trojans(Continued)  NotableTrojans  NetbusAdvanceSystem Care(by Carl-Fredrik Neikter)  Subseven or Sub7(by Mobman)  Back Orifice(Sir Dystic)  Beast  Zeus  Flashback Trojan (Trojan BackDoor.Flashback)  ZeroAccess  Koobface  Vundo
  • 14. Adware  It isany softwarepackagewhich automatically renders advertisementsin order to generaterevenuefor itsauthor.  Softwarethat displayspop-up advertisementstuned to the userscurrent activity, potentially reporting aggregateor anonymized browsing behavior to athird party  Track personal information (including your age, gender, location, buying preferences, surfing habits, etc.)
  • 15. Tracking Cookies  Cookiesthat can track your Web activities  May includecookiesthat contain • user names • passwords  other privateinformation that you enter on web sites(SSN, banking info, credit cards)
  • 16. Preventive Techniques  Don't install any application unlessyou arecertain of what it does or where it came from.  Alwaysread thelicenseagreement  Softwareand OSupgrades  Utilizebrowser'ssecurity settings  UseAnti-Spyware  Spy Sweeper  Microsoft WindowsAnti-Spyware  SpywareDoctor  SpywareSlayer  Spy Killer  Spy Remover
  • 17. What are Keyloggers?  Keystrokelogging, or keyboard capturing  theaction of recording (or logging) thekeys struck on akeyboard, typically in acovert manner  so that theperson using thekeyboard isunaware that their actionsarebeing monitored
  • 18. Typesof Keyloggers HardwareKeyloggers SoftwareKeyloggers Installs in 5 seco nds, simply plug it in. Requires a passwo rd to lo g into the co mputer. Can be installed witho ut lo gging into the co mputer. Requires administratio n rights to install. Can be remo ved, and the info rmatio n retrieved o n ano ther co mputer. Requires that so ftware be installed o n the co mputer. Requires reaching behind the co mputer to plug the device in. Can reco rd o perating system events such as page file size, etc.
  • 21. Some Examples  Actual Spy Keylogger  Ardamax Keylogger  Ghost Keylogger  Golden Keylogger  HomeKeylogger  InvisibleKeylogger  KGB Keylogger  RemoteKeylogger  Soft Central Keylogger  Stealth Keylogger
  • 22. DEMO – 1 Actual Spy Keylogger