You are on page 1of 8

THE SILENT

OBSERVERS
•GUIED: VISHVAJIT THAKKAR
•NAME: KULDIP GOHIL (210110101017)
•NAME: AAZAD BHURIYA (210110101006)
•DEPARTMENT : SCHOOL OF ENGNEERING
•BRANCH: B.TECH COMPUTER SCIENCE & ENGNEERING
INTRODUCTION
• Backdoor Trojan is also known as Keylogger or Keystroke loggers or keyboard capture software, are tools that
monitor and record every keystroke made on a computer or mobile device .
• the recorded keystrokes can include letters, numbers , symbols , and function keys.
• Keyloggers can operate at various levels within a computer ’s operating system , making them powerful and
versatile tools.
TYPES OF KEYLOGGER

Software Keyloggers: These are programs or Hardware Keyloggers: These are physical Memory-injecting Keyloggers: Some
scripts that are installed on a computer like any devices that can be discreetly attached to a
other software. They run in the background, malware can inject themselves into a
computer's keyboard or USB port. They computer's memory, allowing them to
recording keystrokes and storing them for later
retrieval. intercept and record keystrokes as they pass
through the hardware.
capture keystrokes without leaving a
trace on the hard drive.
MALICIOUS USES

Identity Theft: Cybercriminals can use Espionage: State-sponsored actors and Password Cracking: Keyloggers can
keyloggers to steal personal information, cybercriminal organizations may deploy be used to capture passwords, making
such as login credentials, credit card keyloggers to gather sensitive information it easier for hackers to gain
numbers, and social security numbers, for from governments, businesses, or
identity theft and financial fraud. individuals.
unauthorized access to online accounts
and systems.
PROTECTING YOURSELF
 Password management : Password managers generate and
stobre complex, unique passwords for each of your accounts.
They autofill passwords when you need to log in, reducing
the likelihood of keyloggers capturing your keystrokes.
Popular password managers include LastPass, Dashlane ,
and 1Password.
 Enable Two-Factor Authentication (2FA):Enable 2FA
on your accounts whenever possible. Even if a keylogger
captures your password, it won't be sufficient to access
your account without the additional authentication step
(e.g., a code sent to your mobile device or email).

 Use Virtual Keyboards : Many online banking websites and


some login screens offer virtual keyboards that allow you to
click on the characters rather than typing them. This can
thwart keyloggers as they won't capture physical keystrokes.
WHERE WE USE KEYLOGGER

1.Security Testing: Ethical hackers and cybersecurity professionals may use keyloggers to test the
security of computer systems. They use them to identify vulnerabilities and weaknesses in a system's
security by monitoring user activity.
2.Parental Control: Parents may use keyloggers to monitor their children's online activities to ensure
they are safe from potential threats or to prevent them from accessing inappropriate content.
3.Employee Monitoring: Employers may use keyloggers to monitor employee computer usage during
work hours to ensure productivity, prevent data breaches, or investigate any suspicious activity.
4.Personal Use: Some individuals may install keyloggers on their own computers or devices to keep a
record of their typing, such as in the case of a writer or journalist who wants to keep a log of their work.
5.Criminal Activities: Unfortunately, keyloggers can also be used for malicious purposes.
Cybercriminals may use them to steal sensitive information like login credentials, credit card numbers, or
personal data for financial gain.
6.Spyware: Keyloggers can be embedded in spyware or malware, which can be unknowingly installed on
a victim's computer. These malicious keyloggers can capture sensitive information and send it to
malicious actors without the victim's knowledge.
QUESTION & ANSWER

You might also like