Premium Resources
Free Resources
Executing Applications
Intruder executes malicious applications after gaining administrative privileges so they can run malicious programs remotely, to capture all sensitive data, crack passwords, capture screenshots or to install a backdoor.
Tool: RemoteExec, PDQ Deploy, DameWare NT Utilities
Keylogger
keystroke loggers are programs or hardware devices that monitor each keystroke a user types on a keyboard, logs onto a file, or transmits them to a remote location.
keyloggers are placed between the keyboard hardware and the OS
A key logger can
-
Record each keystroke
-
capture screenshots at regular intervals of time showing user activity such as when he or she types a character or click a mouse button
-
Track the activities of users by logging window titles, names of launched applications and other information
-
monitor online activity of users by recording addresses of the websites that they are have visited and with the keywords entered by them
-
record all the login names, bank and credit card numbers and passwords including hidden passwords or data that are in asterisk or blank spaces
-
record online chat conversion
Types of Keylogger
-
Hardware Keylogger
-
Software Keylogger
Spyware
Spyware is stealthy computer monitoring software that allows you to secretly record all activities of a computer user.