ISE1 Learning Journey :D

Saturday, June 5, 2010

Hands-on Project 2-2

Main Objective :
To understand how exactly does a keylogger functions, and how the data capture by the keylogger is actually presented to the attacker. This better understanding of the keylogger, will help us to prevent keylogger from being planted into our computer.

-------------------------------------------------------------------------------------------

Searching for Keyboard Collector using Google


















Search results displayed


















Homepage of the keyboard collector


















Click on the following link to go to the page to download the software



















Click on "Download Now" to download the software required


















Save the file in desired location inside computer

















Run the program












Installing keyboard collector trial



















Select "OK"

















Select "Run Keyboard Collector" then click on "OK"

















Click on the button to activate the trial software
























Click "Yes"









Click on the desktop shortcut to view the key log



















Captured Keyboard Logs

















No sign of keyboard collector software on windows task manager

























Reflection

The reason why keyboard collector software is not displayed under one of the applications running in windows ask manager, might be due to the fact that software keylogger programs hide themselves in the computer to avoid being easily detected by the user.

Maybe its because of the fact that I'm using VMware, so the keyboard collector is unable to capture the keystrokes, which cause my key log to be empty even after I have sent an email. But from the screenshot printed in textbook, I'm still able to understand what information is the keylogger is able to capture without having the user's acknowledgement.

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home