KEYLOGGERS BY COLLIN DONALDSON. DISCLAIMER Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you.

Slides:



Advertisements
Similar presentations
Computer Software 3 Section A Software Basics CHAPTER PARSONS/OJA
Advertisements

A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security Awareness: Applying Practical Security in Your World
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
Programming Introduction November 9 Unit 7. What is Programming? Besides being a huge industry? Programming is the process used to write computer programs.
Buffer Overflow Attacks Figure (a) Situation when the main program is running. (b) After the procedure A has been called. (c) Buffer overflow shown.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
2. Setting Up Your Android Development Environment.
Chapter 1 Computer History, Fundamentals, and Operating Systems.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Lesson 4 Computer Software
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Cyber Crimes.
Type of Software There are two main types of software They are System software Application software Hardware System Software (OS) Application Software.
PTA Linux Series Copyright Professional Training Academy, CSIS, University of Limerick, 2006 © Workshop II Transferable Skills & Common Tasks Professional.
Copyright © 2012 Pearson Education, Inc. Chapter 1: Introduction to Computers and Programming.
Chapter 1: Introduction to Computers and Programming.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
CHAPTER FOUR COMPUTER SOFTWARE.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1 Higher Computing Topic 8: Supporting Software Updated
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Android Security Auditing Slides and projects at samsclass.info.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
CS 127 Introduction to Computer Science. What is a computer?  “A machine that stores and manipulates information under the control of a changeable program”
VIRUS.
Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
W elcome to our Presentation. Presentation Topic Virus.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Rootkits Jonathan Barella Chad Petersen. Overview What are rootkits How do rootkits work How to detect rootkits How to remove rootkits.
Windows Administration How to protect your computer.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
DISCLAIMER  Hacking is only legal under the following circumstances: 1. You hack (penetration test) a device/network you own. 2. You gain explicit, documented.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
By: Maxwell Varner.  Description/Background  Uses for Keyloggers  Types of Keyloggers  Prevention Methods  Causes for Concern  Wrap-up  Questions/Discussion.
Technical Implementation: Security Risks
3.6 Fundamentals of cyber security
Discovering Computers 2012: Chapter 8
Operating System Review
Chapter 2: System Structures
Operating System Review
System And Application Software
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Chapter 6 System and Application Software
Presentation transcript:

KEYLOGGERS BY COLLIN DONALDSON

DISCLAIMER Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit, documented permission from an individual, assumedly a friend. 3.You acquire an Ethical Hacker Certification and hack for a public or private sector organization with explicit permission to do so. This is the safest of the three methods. Hacking is illegal in all other circumstances. Hackers can be charged with fines, misdemeanors, and/or felonies depending on severity and accounts of hacks. For these reasons I will not be demonstrating any live hacking attempts in the wild. For more information

DEFINITION Keystroke Logging (Key-logging): is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

USES Legitimate: Keyloggers are frequently used by search engines, some software packages, and network security. They are also sometimes used in research, particularly acoustics and human-computer interaction. Semi-legitimate: Monitoring the computer habits of people in your family or people you live with i.e. Parental Control. Malicious: Stealing passwords and PII via internet based methods such as honeypots.

HARDWARE VS. SOFTWARE All computer viruses are dependent on both hardware and software. Viruses are normally contained in your hard drive, which is why sandboxing works. Keyloggers are a particularly good example of this by nature. They measure the mechanical input of hardware via keystrokes, yet at the same time process it via queries (software). Therefore we will divide the approaches toward keyloggers between hardware and software.

HARDWARE-FOCUSED KEYLOGGERS BIOS-level firmware (Supply Chain Attack at the factory level) Circuit-based (USB) Wireless keyboard sniffers Keyboard Overlays (ATMs) Acoustic Cryptanalysis Electromagnetic Emission Capturing Optic Surveillance (Hidden camera) Fingerprinting plus Brute-Force Attack

SOFTWARE-FOCUSED KEYLOGGERS API based: Intercept (Hook) and change keyboard API commands Hyper-visor based: Virtual machine running under the OS undetected Kernel based: Rootkits that subvert the OS kernel, often pretending to be device drivers Form grabbing: Log web-forms submissions via web browsers event functions and event listeners. Memory Injection: Alter memory tables associated with system functions and logs the input. Packet Analysis: Captures network traffic (data packets) looking for unencrypted passwords.

COUNTERMEASURES Anti-keyloggers and AV Software Network Monitors(reverse firewalls) Automatic Form Filler Programs (anti-Form Grabbing) One Time Passwords (OTPs) Security Tokens (smartcards) Live CD boot (for OS level keyloggers) Non-traditional input devices (i.e. speech recognition software)

WORKSHOP As a Computer Science professional, it is integral to continue learning new languages and technical skills outside of the classroom. This is why today we will write a simple API-based keylogger program, but not in Java, or COBOL, or Assembly. Due to it’s popularity, simplicity of syntax, and power, we will use Python, a dynamic programming language for today’s workshop.

BRIEF OVERVIEW OF PYTHON Dynamic : (OOP, Procedural, Scripting, etc. ). Strongly Typed: primitives operations must be between same type. Duck typed: Methods and Properties determine valid semantics, not inheritance. Automatic memory management Code is similar to Java and COBOL in syntax and MIPS Assembly in design philosophy

CODE EXAMPLES: DECLARING VARIABLES v = ('a', 'b', 'e') (x, y, z) = v print x print y print z

CODE EXAMPLES: FOR LOOP AND IF/ELSE words = ['A', 'B', 'C', 'D', 'E'] for word in words: print word print "password please\n" password = raw_input("Enter your password: ") if password == "name": print "Access Granted" else: print "Access Denied"

def f(): print "in f, before 1/0" 1/0 # raises a ZeroDivisionError exception print "in f, after 1/0" def g(): print "in g, before f()" f() print "in g, after f()" def h(): print "in h, before g()" try: g() print "in h, after g()" except ZeroDivisionError: print "ZD exception caug ht" print "function h ends" CODE EXAMPLE: TRY/CATCH AND EXCEPTIONS

DOWNLOADS Go to python.org/getit and download a python package compatible with your computer Also download the pyhook and pywin32 modules from goo.gl.DdKLg Now the default Python IDE, IDLE should be on your computer and ready to use. If you don’t want to use IDLE you can also download: The JPython Extension for the Eclipse IDE The Python or IronPython extension for Visual Studio.

STEPS 1.Code the keylogger in IDLE (follow my instructions) 2.Save it as a.pyw file 3.Start notepad and code the launch file (follow my instructions). 4.Save it as a.batch file. 5.Go to your Internet Explorer Shortcut and change it to run using the your launch file (change target to your batch file after right clicking) 6.Run IE and type something into your homepage. 7.Check you IE’s log file (C:\Users\(Your Name)\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5) 8.Shutdown your python files with task manager

FIN