Most of the keyloggers capture the data before it is wriiten to any application like notepad, browser etc. They use different methods like hooks, polling etc.
In polling they keep inquiring the OS that has any key been pressed ? if any key is pressed it is then notified to the keylogger. It is passive method.
In hooks the keylogger is informed in advance when data is to be written.
Keylogger captures data by features like:
1.Screen shots:
Some keylogger log data by taking screen shots of the pc. They take photos of your screen – usually just around your mouse – either at periodic intervals, or every time you do a mouse click. They programattically take a screenshot of the control (button, text box etc) that is under the mouse using Windows API commands.
2. Mouse Position logging
Each time you click, the coordinates of your mouse are captured by the keylogger. As everytime the onscreen keyboard opens at same position so it is easy to guess the key pressed by knowing the coordinates at which the mouse clicked.
3. Field scraping
Field scraping is a term we use to discribe a technique used by quite a few commercial keyloggers to grab your passwords directly from the password field. How does it work? Using Windows API commands, programs can ask Windows for a list of controls in a program (like buttons, text boxes and picture controls). From this, they know about the text boxes in the program. They then ask Windows whether the text boxes have a password mask (ie. if password is written in ***** form). If yes they can then even get the password in plaintext.
4.Clipboard logging
It is a common feature of keyloggers. Whatever you copy to the clipboard is stored, then transmitted to the keylogger. What ever u cut , copy , paste is recorded in clipboard and his can be captured by keylogger too.
I'll recommend u people to develop ur own keylogger & use it for better resluts.
Here are list of some keyloggers available on internet:
1. E-mail keylogger
www.soft-central.net
2. Revealer Keylogger
www.revelerkeylogger.com
3. Handy Keylogger
www.handy-keylogger.com/more-information.html
4. Ardamax Keylogger
www.ardamax.com/keylogger/www.mykeylogger.com/keystroke-logger/powered-keylogger/
6. ELITE keylogger
www.elite-keylogger.com/elite-keylogger-spy-software.html
7. Quick kylogger
www.quick-keylogger.com/more-information.html
8. Spy keylogger
www.spy-key-logger.com
9. Perfect keylogger
http://blazingtools.com/bpk.html
10. Invisible keylogger
www.invisiblekeylogger.com
11. Actual spy
www.actualspy.com
12. Spytector ftp keylogger
www.spytector.com
13. IKS software keylogger
http://amecisco.com/iks2000.htm
14. Ghost keylogger
www.sureshotsoftware.com/keyloggerlite/index.html I think this is enough.
Remember in hacking google.com is only ur pet (doggy), that can sniff treasures for U.
In polling they keep inquiring the OS that has any key been pressed ? if any key is pressed it is then notified to the keylogger. It is passive method.
In hooks the keylogger is informed in advance when data is to be written.
Keylogger captures data by features like:
1.Screen shots:
Some keylogger log data by taking screen shots of the pc. They take photos of your screen – usually just around your mouse – either at periodic intervals, or every time you do a mouse click. They programattically take a screenshot of the control (button, text box etc) that is under the mouse using Windows API commands.
2. Mouse Position logging
Each time you click, the coordinates of your mouse are captured by the keylogger. As everytime the onscreen keyboard opens at same position so it is easy to guess the key pressed by knowing the coordinates at which the mouse clicked.
3. Field scraping
Field scraping is a term we use to discribe a technique used by quite a few commercial keyloggers to grab your passwords directly from the password field. How does it work? Using Windows API commands, programs can ask Windows for a list of controls in a program (like buttons, text boxes and picture controls). From this, they know about the text boxes in the program. They then ask Windows whether the text boxes have a password mask (ie. if password is written in ***** form). If yes they can then even get the password in plaintext.
4.Clipboard logging
It is a common feature of keyloggers. Whatever you copy to the clipboard is stored, then transmitted to the keylogger. What ever u cut , copy , paste is recorded in clipboard and his can be captured by keylogger too.
I'll recommend u people to develop ur own keylogger & use it for better resluts.
Here are list of some keyloggers available on internet:
1. E-mail keylogger
www.soft-central.net
2. Revealer Keylogger
www.revelerkeylogger.com
3. Handy Keylogger
www.handy-keylogger.com/more-information
4. Ardamax Keylogger
www.ardamax.com/keylogger/www.mykeylogge
6. ELITE keylogger
www.elite-keylogger.com/elite-keylogger-
7. Quick kylogger
www.quick-keylogger.com/more-information
8. Spy keylogger
www.spy-key-logger.com
9. Perfect keylogger
http://blazingtools.com/bpk.html
10. Invisible keylogger
www.invisiblekeylogger.com
11. Actual spy
www.actualspy.com
12. Spytector ftp keylogger
www.spytector.com
13. IKS software keylogger
http://amecisco.com/iks2000.htm
14. Ghost keylogger
www.sureshotsoftware.com/keyloggerlite/i
Remember in hacking google.com is only ur pet (doggy), that can sniff treasures for U.
0 comments:
Post a Comment