Hands-on Project 2-2
Main Objective :
To understand how exactly does a keylogger functions, and how the data capture by the keylogger is actually presented to the attacker. This better understanding of the keylogger, will help us to prevent keylogger from being planted into our computer.
-------------------------------------------------------------------------------------------
Searching for Keyboard Collector using Google
Search results displayed
Homepage of the keyboard collector
Click on the following link to go to the page to download the software
Click on "Download Now" to download the software required
Save the file in desired location inside computer
Run the program
Installing keyboard collector trial
Select "OK"
Select "Run Keyboard Collector" then click on "OK"
Click on the button to activate the trial software
Click "Yes"
Click on the desktop shortcut to view the key log
Captured Keyboard Logs
No sign of keyboard collector software on windows task manager
Reflection
The reason why keyboard collector software is not displayed under one of the applications running in windows ask manager, might be due to the fact that software keylogger programs hide themselves in the computer to avoid being easily detected by the user.
Maybe its because of the fact that I'm using VMware, so the keyboard collector is unable to capture the keystrokes, which cause my key log to be empty even after I have sent an email. But from the screenshot printed in textbook, I'm still able to understand what information is the keylogger is able to capture without having the user's acknowledgement.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home