Keystroke logging (often called keylogging)
It is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. However most key logging programs prohibit downloading from the affected victim due to encryption issues and wireless-to-computer difficulties (unless directly on the victim's computer). There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.
Mainly this software is used to track the ATM pin numbers and Online banking passwords so on.
It is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. However most key logging programs prohibit downloading from the affected victim due to encryption issues and wireless-to-computer difficulties (unless directly on the victim's computer). There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.
Mainly this software is used to track the ATM pin numbers and Online banking passwords so on.
A Keylogger device connected to the CPU
Wireless keyboard sniffers
These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked beforehand if the transmissions are to be read.
Acoustic keyloggers
Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each key on the keyboard makes a subtly different acoustic signature when stroked. It is then possible to identify which keystroke signature relates to which keyboard character via statistical methods such as frequency analysis.
Try KEYLOGGER in your PC:
Comments
Post a Comment