- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Keylogger is a type of application or decice which captures all the keystrokes typed on the keyboard stores it as a log. This is used by parents to track the activities of their children. Hackers use this type of application/device to capture sensitive information of their victims. And this type of hacking is used by ethical hackers to track the activities of their criminal susects. In this process 3 types of Keylogger are used. They are:-
1. Keylogger keyboard
In this type of Keylogger, a keyboard application is installed over the device and that keyboard captures all the keystrokes typed on it from normal typing to sensitive login information. This type of Keylogger is mostly used in android phones by telling to victim as it is a stylish keyboard application and when the victim installs it on the phone and uses it, the hacker gets all the keystrokes which he can use to get control over the victim’s accounts using the login details the victim typed.
2. Malicious code/application
This type of Keylogger is a malicious code or program which is secretly injected into victim’s device which gets control over the default original keyboard in that device and captures the keystrokes. These are hard to make but can be used both in desktop or android systems.
3. External devices
External hardwares and accessories are also available on the internet which looks like a normal usb drive but when it is injected in any system, it pretends to be a keyboard so antivirus can’t track it. And when it is injected, it can be used to send and receive keystrokes by hacker into the system. The best example for these type of devices is rubber ducky(Yeah, this is the actual name of the device and can be purchased from hak5.com website).
How to prevent ourselves from Keylogger?
If you want to protect yourself from Keylogger hacking, remember the methods given below :-
1. Don’t let anyone use your personal device.
2. Don’t install any application shared by others and always use genuine applications available on App Store in apple devices; play store in android and Microsoft store in windows.
3. Don’t use or download anything from third-party or suspicious websites.
4. Keep running secure scans to ensure your safety.
5. Use antivirus
How is keylogger made?
The process for making keylogger is not that hard, what you have to kee in mind is that it shouldn't be caught by the antivirus even if you are using it for good purpose. Languages like python are commonly used while making a keylogger application. For android, you have to make an apk file. I am not going to tell the full process in this post, lets do it another time. Anyway making keylogger contains the same process as other applications.
That is it for this post. I hope you understood what is Keylogger and how does it work. Comment down if you have any problems related to hacking, programming or technical knowledge. See you in the next post. Till then…….
Enjoy……….
By Yuvraj Shahi (admin)
Contact me at techboy2ac@gmail.com
Comments
Post a Comment