Hands-on Project 2-2
Main Objective :
To understand how exactly does a keylogger functions, and how the data capture by the keylogger is actually presented to the attacker. This better understanding of the keylogger, will help us to prevent keylogger from being planted into our computer.
-------------------------------------------------------------------------------------------
Searching for Keyboard Collector using Google

Search results displayed

Homepage of the keyboard collector

Click on the following link to go to the page to download the software

Click on "Download Now" to download the software required

Save the file in desired location inside computer

Run the program

Installing keyboard collector trial

Select "OK"

Select "Run Keyboard Collector" then click on "OK"

Click on the button to activate the trial software

Click "Yes"

Click on the desktop shortcut to view the key log

Captured Keyboard Logs

No sign of keyboard collector software on windows task manager

Reflection
The reason why keyboard collector software is not displayed under one of the applications running in windows ask manager, might be due to the fact that software keylogger programs hide themselves in the computer to avoid being easily detected by the user.
Maybe its because of the fact that I'm using VMware, so the keyboard collector is unable to capture the keystrokes, which cause my key log to be empty even after I have sent an email. But from the screenshot printed in textbook, I'm still able to understand what information is the keylogger is able to capture without having the user's acknowledgement.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home