Keylogger or Keystroke loggers intercept the Target’s keystrokes and either saves them in a file or transmit them to a predetermined destination accessible to the Hacker.
Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide variety of confidential information, including passwords, credit card numbers, and private Email ,names, addresses, and phone numbers.
Types of key-loggers
- Hardware keylogger
- Software keylogger
Some Famous keystroke loggers:
- Actual Spy
- Perfect Keylogger
- Family Keylogger
- Home Keylogger
- Soft Central
- Adramax
Stealth
- Invisible in process list
- Includes kernel keystroke driver that captures keystrokes even when user is logged off (Windows 2000 / XP)
- Keystroke / password logging
- Text snapshots of active applications
- Visited Internet URL logger.
- Capture HTTP POST data (including logins/passwords)
- File and Folder creation/removal logging
- Mouse activities
- Workstation user and timestamp recording
- Automatic E-mail log file delivery
- Easy setup & uninstall wizards
- Support for Windows (R) 95/98/ME and Windows (R) NT/2000/XP.
Caution:
- Since a keystroke loggers involves dozens of files, and has as a primary goal complete hiding from the user, removing on manually may be a terrific challenge to any individual.
- Incorrect removal efforts may result in harm to the software package, instability, inability to use the mouse or keyboard, or worse.
- Some keystroke logger will survive manual efforts to remove them, re-installing themselves before the user even reboots.
.