Tải bản đầy đủ - 0 (trang)
IV. HOW TO DETECT AND DEFEAT KEYLOGGERS

IV. HOW TO DETECT AND DEFEAT KEYLOGGERS

Tải bản đầy đủ - 0trang

ELEMENT OF NETWORK



KEYLOGGERS



Well, there are some keylogging devices available which go between your keyboard

and your computer’s USB port. These type of devices are used in cases of corporate

espionage because it’s way easier to pull his off with office computers. So, if you

doubt that your information is being shared check for an added hardware.



2.



PROTECT YOURSELF FROM KEYLOGGERS



Most antivirus companies have already added known keyloggers to their databases,

making protecting against keyloggers no different from protecting against other types

of malicious program: install an antivirus product and keep its database up to date.

However, since most antivirus products classify keyloggers as potentially malicious,

or potentially undesirable programs, users should ensure that their antivirus product

will, with default settings, detect this type of malware. If not, then the product should

be configured accordingly, to ensure protection against most common keyloggers.

Let’s take a closer look at the methods that can be used to protect against unknown

keyloggers or a keylogger designed to target a specific system.

Since the chief purpose of keyloggers is to get confidential data (bank card numbers,

passwords, etc.), the most logical ways to protect against unknown keyloggers are as

follows:

 Using one-time passwords or two-step authentication,

 Using a system with proactive protection designed to detect keylogging

software,

 Using a virtual keyboard.

Using a one-time password can help minimize losses if the password you enter is

intercepted, as the password generated can be used one time only, and the period of

time during which the password can be used is limited. Even if a one-time password is

intercepted, a cyber criminal will not be able to use it in order to obtain access to

confidential information.



3. DETECT AND DEFEAT KEYLOGGERS

Go Through Running Processes

Even if the software program runs in the background, there must be

a process running on the Windows system. You can open task

manager and take a look at what processes are running.



Page 6



ELEMENT OF NETWORK



KEYLOGGERS



If you are a tech-savvy person, it should be easy for you to notice

any suspicious processes on the list. However, for everyone else, the

chances are slim that you’ll find it. The reason is that keylogger

developers won’t name the program process as “keylogger.” That

wouldn’t just be obvious, but also pretty dumb, in my opinion. They

will generally name it something to appear legit like “system_doc” or

“win-process.”

Monitor Network Connections Using Firewall

As the keylogger records keystrokes, it collects them and sends logs

to a remote location. This implies that an internet connection is used

to transmit this file.

You can use applications like Windows Firewall Control to look up

programs using a network connection. They can also be used to set

rules to disallow unknown or unauthorized programs to connect to



Page 7



ELEMENT OF NETWORK



KEYLOGGERS



the internet.



By doing this, you may be able to stop any keylogger from

transmitting data to a hacker. However, this method doesn’t

guarantee that you have blocked the correct process. Also, if there

are multiple ways of file transmission using different processes, you

are out of luck.

Use Keylogger Detector

As we all know most anti-keylogger software are designed to

scramble keyboard keystrokes. However, they are not designed to

detect and remove them from your system. Therefore, you need the

help of some Anti-Rootkit to remove keylogger or any other rootkit

malware. There are many Anti-Rootkit tools available on the

internet. However, these three are the best amongst all:

Malwarebytes Anti-Rootkit Beta: Malwarebytes Anti-Rootkit



Page 8



ELEMENT OF NETWORK



KEYLOGGERS



BETA is cutting edge technology for detecting and removing the

nastiest malicious rootkits. Trust me, it has the potential to detect

some stubborn keyloggers.



Norton Power Eraser: Norton Power Eraser simply eliminates

deeply embedded and difficult-to-detect crimeware that traditional

virus scanning doesn’t always detect. It uses some advanced

scanning technology to eliminate threats that traditional virus

scanning doesn’t always detect.



Page 9



ELEMENT OF NETWORK



KEYLOGGERS



Kaspersky Security Scan: Kaspersky scans PCs for viruses & other

malware. It uses advanced scanning technologies which are

developed by Kaspersky Lab’s world-leading security experts. It

never fails to detect Keyloggers and RANSOMWARE.



V.



CONCLUSION



 A keylogger is a type of surveillance software or Hardware



Page

10



ELEMENT OF NETWORK



KEYLOGGERS



Devices that has the capability to record every keystroke.

 A keylogger recorder can record instant messages, e-mail, and

any information you type at any time using your keyboard.

 The log file created by the keylogger can then be sent to a

specified receiver.

 There are two types of keyloggers namely Hardware Keyloggers

& Software Keyloggers.

 There have Several Measures can be taken to protect against

keyloggers.



Page

11



ELEMENT OF NETWORK



KEYLOGGERS



REFERENCE

[1]. Keystroke logging:

https://en.wikipedia.org/wiki/Keystroke_logging

[2]. What is keylogging? Definition, history, and how to detect: Word

of the week:

https://community.spiceworks.com/topic/2003395-what-iskeylogging-definition-history-and-how-to-detect-word-of-the-week

[3]. How does a keylogger work?

https://www.quora.com/How-does-a-keylogger-work

[4]. Detecting and Removing Keylogger: How To Detect Keylogger &

Remove It From PC 2018:

https://techviral.net/detect-keylogger-in-your-system/

[5]. Keyloggers: How they work and how to detect them:

https://securelist.com/keyloggers-how-they-work-and-how-to-detectthem-part-1/36138/

[6]. How to Detect Keyloggers?

https://www.malwarefox.com/detect-keyloggers/

[7]. How to detect if a Keylogger is installed?

https://answers.microsoft.com/en-us/windows/forum/windows_vistasecurity/how-to-detect-if-a-keylogger-is-installed/d14c6cd6-69754b25-a2c5-17e5de194b50

[8]. Keyloggers’s Presentation:

https://www.slideshare.net/doranegoda/keyloggers-71486403

[9]. Creating a simple Keylogger with C#:

https://www.youtube.com/watch?v=_y3BAQs8-uc



Page

12



Tài liệu bạn tìm kiếm đã sẵn sàng tải về

IV. HOW TO DETECT AND DEFEAT KEYLOGGERS

Tải bản đầy đủ ngay(0 tr)

×