Download presentation
Presentation is loading. Please wait.
1
By BIJAY ACHARYA Twitter.com/acharya_bijay
CYBER WELCOMES YOU ;) Warning : * This is a demo, so that you can secure yourself from these kind of attack. Never use this trick for bad purpose. RESPECT TECHNOLOGY By BIJAY ACHARYA Twitter.com/acharya_bijay
2
By BIJAY ACHARYA Twitter.com/acharya_bijay
Keylogger Attack By BIJAY ACHARYA Twitter.com/acharya_bijay
3
Phishing Using Keyloggers
- records keystrokes made on a computer. - captures every key pressed on the keyboard and stores it down in a file or memory bank that can be viewed by the person performing the monitoring in real-time, or at a later date There are two types of keylogger: hardware keylogger and software keylogger *We will see demo of software keylogger.
4
Now, Danger Zone ? ? ? Cyber (Most Critical)
Our home computer repairers Friends OTHER ? ? ?
5
Hardware Keylogger Three types :
Inline devices that are attached to the keyboard cable Devices which can be installed inside standard keyboards Actual replacement keyboards that contain the key logger already built-in ***It only can be discovered by people and removed physically Src :
6
Software Keylogger
7
Software Keylogger * Can capture both keys pressed and screen * 2 sub-categories : Visible in the task manager Invisible and stealth keyloggers * Secure ? No, Antivirus is not enough Keyloggers and Trojans often aren’t detected by Antivirus systems, so make sure you have a good spyware detection and removal tool OR verify your Antivirus program handles these spyware threats as well. Make sure this software is update. *Later we will see how anyone can attack our computer via network and capture all keystrokes (Kali Linux).
8
By BIJAY ACHARYA Twitter.com/acharya_bijay
DEMO TIME ! ! ! By BIJAY ACHARYA Twitter.com/acharya_bijay
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.