SlideShare a Scribd company logo
1 of 23
SPYWARES
&
KEYLOGGERS
Presented By
JITHIN JAMES

Introduction

What areSpywares?

What areKey loggers?

Demo
Outline
What Are Spywares ?

Applicationsthat send information from your
computer to thecreator of thespyware

Consistsof an corefunctionality and ahidden
functionality of information gathering

Can beused for marketing information, to determine
their stancewith regard to competitorsand market
trends

Can also beused to log keystrokesand send thoseto
whomever
Definition
Spywareissoftware

that aidsin gathering information about a
person or organization

without their knowledge

may send such information to another
entity without theconsumer'sconsent

assertscontrol over acomputer
without theconsumer'sknowledge.
Spyware Symptoms
Themajor symptomsare

reset your browser'shomepage

produceeven moreinvasiveadvertisements

“pop-up” ads

unwanted CPU activity

disk usage

network traffic

applicationsfreezing

failureto boot

system-widecrashes
Spyware Symptoms(Continued)
Types of Spyware
Spywarecan bebroken down into four different
categories:

System monitors

Trojans

Adware

Tracking cookies
System Monitors

Tracking Softwareused to monitor computer activity

keystrokes, e-mails, chat room conversations, instant
messages, Web sitesvisited, programsrun, timespent on
Web sitesor using programs, or user-namesand
passwords.

Theinformation istypically either stored for later
retrieval or transmitted to theremoteprocessor person
employing theMonitor

Key-loggersand Screen Scrapersaretypesof System
Monitors.
Trojans

TrojansHorsesor Trojansaremaliciousprogramsthat appear
asharmlessor even desirableapplications.

Designed to causelossor theft of computer data, and to
destroy your system.

Seven major types

RemoteAccessTrojans

DataSending Trojans

DestructiveTrojans

Proxy Trojans

FTPTrojans

Security SoftwareDisabler Trojans

Denial-of-Serviceattack (DoS) Trojans
Trojans(Continued)
Trojans(Continued)

NotableTrojans

NetbusAdvanceSystem Care(by Carl-Fredrik
Neikter)

Subseven or Sub7(by Mobman)

Back Orifice(Sir Dystic)

Beast

Zeus

Flashback Trojan (Trojan BackDoor.Flashback)

ZeroAccess

Koobface

Vundo
Adware

It isany softwarepackagewhich automatically renders
advertisementsin order to generaterevenuefor itsauthor.

Softwarethat displayspop-up advertisementstuned to the
userscurrent activity, potentially reporting aggregateor
anonymized browsing behavior to athird party

Track personal information (including your age, gender,
location, buying preferences, surfing habits, etc.)
Tracking Cookies

Cookiesthat can track your Web activities

May includecookiesthat contain
• user names
• passwords

other privateinformation that you enter on
web sites(SSN, banking info, credit cards)
Preventive Techniques

Don't install any application unlessyou arecertain of what it
does or where it came from.

Alwaysread thelicenseagreement

Softwareand OSupgrades

Utilizebrowser'ssecurity settings

UseAnti-Spyware

Spy Sweeper

Microsoft WindowsAnti-Spyware

SpywareDoctor

SpywareSlayer

Spy Killer

Spy Remover
What are Keyloggers?

Keystrokelogging, or keyboard capturing

theaction of recording (or logging) thekeys
struck on akeyboard, typically in acovert manner

so that theperson using thekeyboard isunaware
that their actionsarebeing monitored
Typesof Keyloggers
HardwareKeyloggers SoftwareKeyloggers
Installs in 5 seco nds, simply plug
it in.
Requires a passwo rd to lo g into
the co mputer.
Can be installed witho ut lo gging
into the co mputer.
Requires administratio n rights to
install.
Can be remo ved, and the
info rmatio n retrieved o n ano ther
co mputer.
Requires that so ftware be installed
o n the co mputer.
Requires reaching behind the
co mputer to plug the device in.
Can reco rd o perating system
events such as page file size, etc.
HardwareKeylogger
SoftwareKeylogger
Some Examples

Actual Spy Keylogger

Ardamax Keylogger

Ghost Keylogger

Golden Keylogger

HomeKeylogger

InvisibleKeylogger

KGB Keylogger

RemoteKeylogger

Soft Central Keylogger

Stealth Keylogger
DEMO – 1
Actual Spy Keylogger
THANKYOU

More Related Content

What's hot

What's hot (20)

Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
MALWARE
MALWAREMALWARE
MALWARE
 
Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)Denial of Service Attacks (DoS/DDoS)
Denial of Service Attacks (DoS/DDoS)
 
Malicious
MaliciousMalicious
Malicious
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Metasploit
MetasploitMetasploit
Metasploit
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Malware
MalwareMalware
Malware
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked

Viewers also liked (10)

Keylogger
KeyloggerKeylogger
Keylogger
 
Hacking with a keylogger.
Hacking with a keylogger.Hacking with a keylogger.
Hacking with a keylogger.
 
06 facebook security
06 facebook security06 facebook security
06 facebook security
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
What is keylogger
What is keyloggerWhat is keylogger
What is keylogger
 
Virtual keyboard ppt
Virtual keyboard pptVirtual keyboard ppt
Virtual keyboard ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar to Spywares & Keyloggers

Similar to Spywares & Keyloggers (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Spyware
SpywareSpyware
Spyware
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
spyware
spywarespyware
spyware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Security threats explained
Security threats explained Security threats explained
Security threats explained
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Spyware
SpywareSpyware
Spyware
 

Recently uploaded

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Recently uploaded (11)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 

Spywares & Keyloggers

  • 3.
  • 4. What Are Spywares ?  Applicationsthat send information from your computer to thecreator of thespyware  Consistsof an corefunctionality and ahidden functionality of information gathering  Can beused for marketing information, to determine their stancewith regard to competitorsand market trends  Can also beused to log keystrokesand send thoseto whomever
  • 5.
  • 6. Definition Spywareissoftware  that aidsin gathering information about a person or organization  without their knowledge  may send such information to another entity without theconsumer'sconsent  assertscontrol over acomputer without theconsumer'sknowledge.
  • 7. Spyware Symptoms Themajor symptomsare  reset your browser'shomepage  produceeven moreinvasiveadvertisements  “pop-up” ads  unwanted CPU activity  disk usage  network traffic  applicationsfreezing  failureto boot  system-widecrashes
  • 9. Types of Spyware Spywarecan bebroken down into four different categories:  System monitors  Trojans  Adware  Tracking cookies
  • 10. System Monitors  Tracking Softwareused to monitor computer activity  keystrokes, e-mails, chat room conversations, instant messages, Web sitesvisited, programsrun, timespent on Web sitesor using programs, or user-namesand passwords.  Theinformation istypically either stored for later retrieval or transmitted to theremoteprocessor person employing theMonitor  Key-loggersand Screen Scrapersaretypesof System Monitors.
  • 11. Trojans  TrojansHorsesor Trojansaremaliciousprogramsthat appear asharmlessor even desirableapplications.  Designed to causelossor theft of computer data, and to destroy your system.  Seven major types  RemoteAccessTrojans  DataSending Trojans  DestructiveTrojans  Proxy Trojans  FTPTrojans  Security SoftwareDisabler Trojans  Denial-of-Serviceattack (DoS) Trojans
  • 13. Trojans(Continued)  NotableTrojans  NetbusAdvanceSystem Care(by Carl-Fredrik Neikter)  Subseven or Sub7(by Mobman)  Back Orifice(Sir Dystic)  Beast  Zeus  Flashback Trojan (Trojan BackDoor.Flashback)  ZeroAccess  Koobface  Vundo
  • 14. Adware  It isany softwarepackagewhich automatically renders advertisementsin order to generaterevenuefor itsauthor.  Softwarethat displayspop-up advertisementstuned to the userscurrent activity, potentially reporting aggregateor anonymized browsing behavior to athird party  Track personal information (including your age, gender, location, buying preferences, surfing habits, etc.)
  • 15. Tracking Cookies  Cookiesthat can track your Web activities  May includecookiesthat contain • user names • passwords  other privateinformation that you enter on web sites(SSN, banking info, credit cards)
  • 16. Preventive Techniques  Don't install any application unlessyou arecertain of what it does or where it came from.  Alwaysread thelicenseagreement  Softwareand OSupgrades  Utilizebrowser'ssecurity settings  UseAnti-Spyware  Spy Sweeper  Microsoft WindowsAnti-Spyware  SpywareDoctor  SpywareSlayer  Spy Killer  Spy Remover
  • 17. What are Keyloggers?  Keystrokelogging, or keyboard capturing  theaction of recording (or logging) thekeys struck on akeyboard, typically in acovert manner  so that theperson using thekeyboard isunaware that their actionsarebeing monitored
  • 18. Typesof Keyloggers HardwareKeyloggers SoftwareKeyloggers Installs in 5 seco nds, simply plug it in. Requires a passwo rd to lo g into the co mputer. Can be installed witho ut lo gging into the co mputer. Requires administratio n rights to install. Can be remo ved, and the info rmatio n retrieved o n ano ther co mputer. Requires that so ftware be installed o n the co mputer. Requires reaching behind the co mputer to plug the device in. Can reco rd o perating system events such as page file size, etc.
  • 21. Some Examples  Actual Spy Keylogger  Ardamax Keylogger  Ghost Keylogger  Golden Keylogger  HomeKeylogger  InvisibleKeylogger  KGB Keylogger  RemoteKeylogger  Soft Central Keylogger  Stealth Keylogger
  • 22. DEMO – 1 Actual Spy Keylogger