0% found this document useful (0 votes)
62 views29 pages

Problem Based Task Computer Network Security

The document discusses keyloggers, which are software or hardware tools that can covertly record keyboard keystrokes. It describes how keyloggers work, their legitimate and malicious uses, and ethical and legal issues related to privacy. It also provides instructions for installing and using three keylogger software, and demonstrates how to detect a keylogger on a system. Finally, it discusses strategies like antivirus software, keeping systems updated, and two-factor authentication to mitigate keylogger attacks.

Uploaded by

Mysarah adriana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views29 pages

Problem Based Task Computer Network Security

The document discusses keyloggers, which are software or hardware tools that can covertly record keyboard keystrokes. It describes how keyloggers work, their legitimate and malicious uses, and ethical and legal issues related to privacy. It also provides instructions for installing and using three keylogger software, and demonstrates how to detect a keylogger on a system. Finally, it discusses strategies like antivirus software, keeping systems updated, and two-factor authentication to mitigate keylogger attacks.

Uploaded by

Mysarah adriana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Introduction

A keylogger, whether software or hardware, is a type of cyber threat that records the keystroke on
a keyboard, typically covertly, so the person using the keyboard is unaware that their actions are
being monitored. Keyloggers aims to capture sensitive information, such as login credentials,
credit card numbers, and confidential messages, without the user’s knowledge or consent.
Keyloggers can be used for both legitimate and malicious purposes.
There are various potential applications across several domains includes employers might utilize
them to track employee activities, ensuring adherence to company policies and enhancing
productivity. Similarly, parents may employ keyloggers to oversee their children's online behavior,
safeguarding them from potential risks. In cybersecurity, professionals may deploy keyloggers for
penetration testing or forensic analysis to detect vulnerabilities or unauthorized access.
Software and hardware keyloggers exhibit distinct characteristics and functionalities. Software
keyloggers, being programs installed on computers or devices, offer flexibility and ease of
deployment. They discreetly operate in the background, capturing keystrokes and transmitting
them remotely or logging them locally. While, hardware keyloggers are physical devices inserted
between the keyboard and the computer or connected via USB ports. While they are harder to
detect due to their independent operation, they necessitate physical access for installation,
presenting practical challenges for attackers.
The use of keyloggers raises profound ethical and legal concerns regarding privacy and data
security. Ethically, their deployment demands transparency and respect for individuals' privacy
rights. Whether in employment settings or parental control scenarios, informing users about
monitoring activities is paramount to maintaining trust and ethical standards. Legally, keylogger
usage must adhere to applicable laws and regulations governing data privacy and electronic
communications. Unauthorized interception of keystrokes without consent may constitute a breach
of privacy laws, inviting legal penalties.
We are exploring the various settings and options available in the three keylogger software which
is Spyrix Keylogger, All in One Keylogger and Kidlogger. Those keylogger software offer
comprehensive monitoring capabilities for various purposes, including parental control, employee
monitoring, and cybersecurity investigations. Also, to monitor activities, track keystrokes, website
visits to ensure responsible usage and prevent potential misuse or infringement of individuals'
rights.

Installation and Configuration of Keylogger Spyrix


Keylogger:

1. Firstly, the program can be downloaded from Microsoft Edge. You


should use Windows 10 to perform this task. Once the download is
finished, click on the downloaded file to run the installation. Click
“Yes” when prompted by the system.
2. Next choose the language what you want to setup for language.

3. After that you should click Choose "I accept the agreement" and click
the “Next" button.
4. Then click "Install" and wait for the installation to finish setup. After
clicking "Finish" to complete the installation. The program will launch
automatically after that.

5. After the installation the program will launch the Settings Wizard. If
you do not want to configure any settings you can "Skip Wizard". Click
button “Next”.
6. Enter your email address, wait for the program to check it, and click
"Next". Then a new window will open – click "Ok" to create your
account.

7. If you’ve done everything correctly, you will see this message. Then you
need to go to your email and activate your account. When you click the
account activation link you need to set up your account password to log
in.
8. Set the quality of screenshots and choose when they should be made.

9. Choose if and how the program will be hidden on the target computer.
Also check all users you want to monitor. If you want the program to
run automatically, leave “Start at Windows startup” box checked.
10. In Spyrix interface, we can see there are various settings and options in
this software such as Screenshots features. In this feature, it will detect
the screenshot that we perform in Windows.

11. Besides, there are user activity features which will detect the user
activity such as what user are searching follow by the date and time.
12. Also, there are programs activity also in this software which it will
detect if we open the programs such as we open the Internet browser. It
will display on this feature also followed by the date and time

Best Free Keylogger:

1. Go to browser on Windows and search for Best Free Keylogger. Click on


download to install the software.
2. Then, it will display this interface. You have to click Download on the
lite version and start performing the installation.
3. After downloading, it will ask you to set up the installation. Click on
Next to start the setup and installation of the software. You must click
Next on every section until it displays Finish.

4. This is the License Agreement. You must click I accept the agreement to
continue setup the software and click on Next to go the next setup.
5. Then, you must select the destination location. Just put the software on
the Program File location and click Next.

6. After that, the software is ready to install. Click Install to continue using
the software. Also, you must wait for a while to finish the installation.
7. After the installation have completed, click Finish so the software are
ready to use.

8. Before opening the software, restart the Windows first. Then, open the
keylogger software. It will ask you to create the password. Ensure that
you remember the password to login the software.
9. Next, login to the software by entering the password that you have
created before. Click Login.

10. This is the interface of Best Free Keylogger software. It also have
various option, settings and features. You may explore the features in
the menu bar. This is the interface of keystrokes. It detect the keystrokes
of the user.
11. This is the interface of Applications. In this features, you may see that
the software have detect the user activity which is what did user open in
the browser.

12. For example, I open the WordPad and type "password". Reload the
keylogger to see whether that the software have detected the keystrokes.
13. Also, in application section, it detect and show that the user have open
the wordpad on the windows.

Refog Personal Monitor:

1. Firstly, you need to go to


https://login.refog.com/account/signup/?next=/download to download
refog software. You need to create an account by entering your email
and password.
2. After creating an account, you need to choose Personal Monitor for
windows and click the download button to download.

3. After finish downloading, refog the personal monitor tick on "My own
computer" and then click Next.
4. Read the license agreement and click the “I Agree" button.

5. Tick on the Select All box and click Next button.


6. Enter your login email and password that you already created earlier
and tick on checkbox. After that click Active button. It will pop out this
message after you click active.

7. After all the setup is done, click the install button to start the
installation.
8. The software required you to restart your window by clicking button
"Restart Now".

9. When the windows are done restart go to Run by click Window key + R,
then type runrefog to open the software.
10. As you see this is the interface of Refog Personal Monitor. As the picture
shows it’s the Keystrokes Typed interface, it shows the password of my
polycc cidos account. The rest of it is the activity that I do just now.

11. This is the screenshots interface where the Refog Personal Monitor
capture activity that I do on the windows. The screenshot shows the
cidos account of mine.
12. Next, there is Website Visited which is what website that i visit while
refog keylogger is running on my windows. It also provides the specifi
time and date.

Detection of Keylogger

1. This is the detection of Refog Personal Monitor keylogger where the


Task Manager found that the keylogger is running on this window.
2. Next is using AVG AntiVirus which it show that the antivirus found
threats when running the keylogger on this windows.
Mitigation Strategies
Protecting against keylogger attacks requires a proactive approach that encompass
best practices to mitigate the risk effectively. One of the strategies to mitigate the
attacks is by employing reputable antivirus software in defending against keylogger
attacks. These robust security solutions are equipped to detect and remove
keyloggers and other malware before they can compromise system integrity.
Reputable antivirus programs continually update the databases to recognize the latest
threats, ensuring protection against evolving attack vectors.
Besides, regularly updating all software components, including operating systems,
web browsers, and applications, is one of the strategies to mitigate keylogger attacks.
It is essential for maintaining a secure computing environment. Software updates
often include patches and fixes for known vulnerabilities that keyloggers and other
malware exploit to gain unauthorized access.
Additionally, implementing two-factor authentication (2FA) is a powerful strategy
for enhancing security and mitigating the risks posed by keylogger attacks. By
requiring users to provide two separate forms of identification before gaining access
to an account or system, 2FA significantly reduces the effectiveness of keyloggers in
compromising sensitive information.
Furthermore, using virtual keyboards is additional effective security measure for
protecting against keylogger attacks, especially when entering sensitive information
such as passwords, credit card numbers, or personal identification number (PIN).
Virtual keyboards display a graphical representation of a keyboard on the screen,
allowing users to input characters by clicking with a mouse or tapping on a
touchscreen, rather than typing on a physical keyboard.
Other that that, regularly monitor accounts for suspicious activity such as monitoring
bank accounts, email accounts and other online services for any unauthorized
transactions or activities could be one of the security measure. It can help detect
potential keylogger attacks early. Also, promptly reporting any suspicious activity to
the service provider or bank can prevent further unauthorized access.
Conclusion and Discussion
In conclusion, keyloggers represent both a valuable tool for legitimate purposes and
a potential threat to privacy and security. The exploration and utilization of keylogger
software have provided valuable insights into both its capabilities and the potential
risks associated with its deployment. Keyloggers, whether software or hardware-
based, represent powerful surveillance tools capable of capturing sensitive
information such as passwords, credit card numbers, and personal messages.
Throughout the installation and configuration process, we gained an understanding
of the various settings and options available in keylogger software, including stealth
mode, encryption, and remote monitoring capabilities. Additionally, we discussed
methods for detecting keyloggers, such as running scans using antivirus software
and manual inspection of system files and processes.
Spyrix Keylogger Refog Keylogger and Best Free Keylogger have provides essential
capabilities for capturing keystrokes, recording website visits, and monitoring
application usage that we have perform on the Windows. It get to detect the task that
we perform such as the password that we login in the web application. In summary,
each keylogger software offers unique features and capabilities for monitoring and
recording user activity on computers.
By following those best practices effectively, users can significantly enhance their
defenses against keylogger attacks and safeguard their sensitive information from
unauthorized access or theft.

REFERENCES
• Waterson, Dave. (16,Feb 2021). How Keyloggers Work and How To Defeat Them.
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7928946/

• Fruhlinger, Josh. (17, May 2022). Keyloggers explained: How attackers record computer inputs.
https://www.csoonline.com/article/566645/keyloggers-explained-how-attackers-
recordcomputer-inputs.html

• CARLOS, SAN. CA. (9 Jun 2022). May 2022’s Most Wanted Malware: Snake Keylogger Returns to
the Top Ten after a long absence. https://www.checkpoint.com/press-releases/may-2022smost-
wanted-malware-snake-keylogger-returns-to-the-top-ten-after-a-long-absence/

You might also like