From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Outlining keystroke loggers
From the course: Ethical Hacking: System Hacking
Outlining keystroke loggers
- [Instructor] Keystroke loggers record every keystroke made on the system to capture information. In this segment, we'll compare software and hardware keyloggers. First, let's talk about how keystroke loggers are used. A keystroke logger quietly records all activity, including what you put in a Word document, email, online chats, and internet use. Keystroke loggers are used for a number of different legitimate reasons. Company security, parental control, and schools use it to monitor internet usage. However, a keylogger can be used for malicious purposes. Because a keylogger records all keystrokes, you can see the names and passwords in plain text as someone types it into a form. In addition, if using secure email, such as GNU Privacy Guard, you'll be able to see the email before encryption. Now, let's compare software and hardware keyloggers. A software keylogger will run in the background and record every keystroke, and then stores the result on a hard drive on the system. The data…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.