From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Outlining keystroke loggers

Outlining keystroke loggers

- [Instructor] Keystroke loggers record every keystroke made on the system to capture information. In this segment, we'll compare software and hardware keyloggers. First, let's talk about how keystroke loggers are used. A keystroke logger quietly records all activity, including what you put in a Word document, email, online chats, and internet use. Keystroke loggers are used for a number of different legitimate reasons. Company security, parental control, and schools use it to monitor internet usage. However, a keylogger can be used for malicious purposes. Because a keylogger records all keystrokes, you can see the names and passwords in plain text as someone types it into a form. In addition, if using secure email, such as GNU Privacy Guard, you'll be able to see the email before encryption. Now, let's compare software and hardware keyloggers. A software keylogger will run in the background and record every keystroke, and then stores the result on a hard drive on the system. The data…

Contents