Professional Documents
Culture Documents
ITNE341 EXP. 4
Attack tools
- Task 1: Use a Software Keylogger
A keylogger program captures everything that a user enters on a computer keyboard. In this
project, you will download and use a software keylogger.
The purpose of this activity is to provide information regarding how these programs function
in order that adequate defenses can be designed and implemented. These programs should
never be used in a malicious fashion against another user.
1. Open your web browser and enter the URL: https://www.spyrix.com/download.php The
location of content on the Internet may change without warning. If you are no longer able to
access the program through the
above URL, use a search engine to search for “Spyrix Personal Monitor”.
2. Click products and compare the features of the different Spyrix products.
3. Click download.
4. Under Spyrix Free Keylogger click Free Download.
5. When the file finishes downloading, install Spyrix and follow the default installation
procedures.
6. Click Finish to launch Spyrix.
7. Click Skip to skip the wizard of set the program settings.
8. Spyrix application in going to start, make sure to enable the logging.
9. Now use your computer for several minutes as you normally would.
10. Click the Spyrix icon in your system tray
11. Under Events click ALL EVENTS to view everything that has been done on the
computer. (Snapshot)
12. Click Screenshots to show screen shots for the computer application and activities.
(Snapshot)
13. Click Program Activity to view the programs that you were using. (Snapshot)
14. click keylogger to see the logged keyboard strokes. (Snapshot)
14. Select several other options to view the keylogging and spy features of this program.
15. Click Stop and then Exit.
16. Enter your password and click OK.
17. Close all windows.
-Write a conclusion that talks about the best practice to prevent getting caught by keylogers.
18. What does this tell you about the speed of rainbow tables? What does it tell you about
how easy it is for attackers to crack weak passwords?
19. Close all windows.
-Write a paragraph that talks about different types of password cracking attack types and what are
the best practice to mitigate their risks.