spywares & keyloggers

23
SPYWARES & KEYLOGGERS Presented By JITHIN JAMES

Upload: jithin-james

Post on 21-Jul-2015

48 views

Category:

Internet


0 download

TRANSCRIPT

SPYWARES&

KEYLOGGERSPresented By

JITHIN JAMES

Introduction What are Spywares? What are Key loggers? Demo

Outline

What Are Spywares ? Applications that send information from your

computer to the creator of the spyware

Consists of an core functionality and a hidden functionality of information gathering

Can be used for marketing information, to determine their stance with regard to competitors and market trends

Can also be used to log keystrokes and send those to whomever

DefinitionSpyware is software that aids in gathering information about a person or organization

without their knowledge may send such information to another entity without the consumer's consent

asserts control over a computer without the consumer's knowledge.

Spyware Symptoms

The major symptoms are

reset your browser's home page produce even more invasive advertisements “pop-up” ads unwanted CPU activity disk usage network traffic applications freezing failure to boot system-wide crashes

Spyware Symptoms(Continued)

Types of Spyware

Spyware can be broken down into four different categories:

System monitors Trojans Adware Tracking cookies

System Monitors

Tracking Software used to monitor computer activity keystrokes, e-mails, chat room conversations, instant

messages, Web sites visited, programs run, time spent on Web sites or using programs, or user-names and passwords.

The information is typically either stored for later retrieval or transmitted to the remote process or person employing the Monitor

Key-loggers and Screen Scrapers are types of System Monitors.

Trojans Trojans Horses or Trojans are malicious programs that appear

as harmless or even desirable applications. Designed to cause loss or theft of computer data, and to

destroy your system. Seven major types

Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans Security Software Disabler Trojans Denial-of-Service attack (DoS) Trojans

Trojans(Continued)

Trojans(Continued) Notable Trojans

Netbus Advance System Care(by Carl-Fredrik Neikter)

Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus Flashback Trojan (Trojan BackDoor.Flashback) ZeroAccess Koobface Vundo

Adware

It is any software package which automatically renders advertisements in order to generate revenue for its author.

Software that displays pop-up advertisements tuned to the users current activity, potentially reporting aggregate or anonymized browsing behavior to a third party

Track personal information (including your age, gender, location, buying preferences, surfing habits, etc.)

Tracking Cookies

Cookies that can track your Web activities May include cookies that contain

• user names• passwords

other private information that you enter on web sites (SSN, banking info, credit cards)

Preventive Techniques

Don't install any application unless you are certain of what it does or where it came from.

Always read the license agreement Software and OS upgrades Utilize browser's security settings Use Anti-Spyware

Spy Sweeper Microsoft Windows Anti-Spyware Spyware Doctor Spyware Slayer Spy Killer Spy Remover

What are Keyloggers?

Keystroke logging, or keyboard capturing the action of recording (or logging) the keys

struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware

that their actions are being monitored

Types of Keyloggers

Hardware Keyloggers Software Keyloggers

Installs in 5 se co nds, simply plug it in.

Re quire s a passwo rd to lo g into the co mpute r.

Can be installe d witho ut lo g g ing into the co mpute r.

Re quire s administratio n rights to install.

Can be remo ve d, and the info rmatio n re trie ve d o n ano the r

co mpute r.Re quire s that so ftware be installe d

o n the co mpute r.

Re quire s re aching behind the co mpute r to plug the de vice in.

Can re co rd o pe rating system e ve nts such as pag e file size , e tc .

Hardware Keylogger

Software Keylogger

Some Examples Actual Spy Keylogger Ardamax Keylogger Ghost Keylogger Golden Keylogger Home Keylogger Invisible Keylogger KGB Keylogger Remote Keylogger Soft Central Keylogger Stealth Keylogger

DEMO – 1

Actual Spy Keylogger

THANK YOU