spywares & keyloggers
Post on 21-Jul-2015
49 Views
Preview:
TRANSCRIPT
What Are Spywares ? Applications that send information from your
computer to the creator of the spyware
Consists of an core functionality and a hidden functionality of information gathering
Can be used for marketing information, to determine their stance with regard to competitors and market trends
Can also be used to log keystrokes and send those to whomever
DefinitionSpyware is software that aids in gathering information about a person or organization
without their knowledge may send such information to another entity without the consumer's consent
asserts control over a computer without the consumer's knowledge.
Spyware Symptoms
The major symptoms are
reset your browser's home page produce even more invasive advertisements “pop-up” ads unwanted CPU activity disk usage network traffic applications freezing failure to boot system-wide crashes
Types of Spyware
Spyware can be broken down into four different categories:
System monitors Trojans Adware Tracking cookies
System Monitors
Tracking Software used to monitor computer activity keystrokes, e-mails, chat room conversations, instant
messages, Web sites visited, programs run, time spent on Web sites or using programs, or user-names and passwords.
The information is typically either stored for later retrieval or transmitted to the remote process or person employing the Monitor
Key-loggers and Screen Scrapers are types of System Monitors.
Trojans Trojans Horses or Trojans are malicious programs that appear
as harmless or even desirable applications. Designed to cause loss or theft of computer data, and to
destroy your system. Seven major types
Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-of-Service attack (DoS) Trojans
Trojans(Continued) Notable Trojans
Netbus Advance System Care(by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus Flashback Trojan (Trojan BackDoor.Flashback) ZeroAccess Koobface Vundo
Adware
It is any software package which automatically renders advertisements in order to generate revenue for its author.
Software that displays pop-up advertisements tuned to the users current activity, potentially reporting aggregate or anonymized browsing behavior to a third party
Track personal information (including your age, gender, location, buying preferences, surfing habits, etc.)
Tracking Cookies
Cookies that can track your Web activities May include cookies that contain
• user names• passwords
other private information that you enter on web sites (SSN, banking info, credit cards)
Preventive Techniques
Don't install any application unless you are certain of what it does or where it came from.
Always read the license agreement Software and OS upgrades Utilize browser's security settings Use Anti-Spyware
Spy Sweeper Microsoft Windows Anti-Spyware Spyware Doctor Spyware Slayer Spy Killer Spy Remover
What are Keyloggers?
Keystroke logging, or keyboard capturing the action of recording (or logging) the keys
struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware
that their actions are being monitored
Types of Keyloggers
Hardware Keyloggers Software Keyloggers
Installs in 5 se co nds, simply plug it in.
Re quire s a passwo rd to lo g into the co mpute r.
Can be installe d witho ut lo g g ing into the co mpute r.
Re quire s administratio n rights to install.
Can be remo ve d, and the info rmatio n re trie ve d o n ano the r
co mpute r.Re quire s that so ftware be installe d
o n the co mpute r.
Re quire s re aching behind the co mpute r to plug the de vice in.
Can re co rd o pe rating system e ve nts such as pag e file size , e tc .
Some Examples Actual Spy Keylogger Ardamax Keylogger Ghost Keylogger Golden Keylogger Home Keylogger Invisible Keylogger KGB Keylogger Remote Keylogger Soft Central Keylogger Stealth Keylogger
top related