Sunday, June 12, 2011

How most key loggers work(with download link)

Most of the keyloggers capture the data before it is wriiten to any application like notepad, browser etc. They use different methods like hooks, polling etc.

In polling they keep inquiring the OS that has any key been pressed ? if any key is pressed it is then notified to the keylogger. It is passive method.

In hooks the keylogger is informed in advance when data is to be written.

Keylogger captures data by features like:



1.Screen shots:




Some keylogger log data by taking screen shots of the pc. They take photos of your screen – usually just around your mouse – either at periodic intervals, or every time you do a mouse click. They programattically take a screenshot of the control (button, text box etc) that is under the mouse using Windows API commands.



2. Mouse Position logging

Each time you click, the coordinates of your mouse are captured by the keylogger. As everytime the onscreen keyboard opens at same position so it is easy to guess the key pressed by knowing the coordinates at which the mouse clicked.



3. Field scraping

Field scraping is a term we use to discribe a technique used by quite a few commercial keyloggers to grab your passwords directly from the password field. How does it work? Using Windows API commands, programs can ask Windows for a list of controls in a program (like buttons, text boxes and picture controls). From this, they know about the text boxes in the program. They then ask Windows whether the text boxes have a password mask (ie. if password is written in ***** form). If yes they can then even get the password in plaintext.



4.Clipboard logging

It is a common feature of keyloggers. Whatever you copy to the clipboard is stored, then transmitted to the keylogger. What ever u cut , copy , paste is recorded in clipboard and his can be captured by keylogger too.





I'll recommend u people to develop ur own keylogger & use it for better resluts.

Here are list of some keyloggers available on internet:

1. E-mail keylogger

www.soft-central.net

2. Revealer Keylogger

www.revelerkeylogger.com

3. Handy Keylogger

www.handy-keylogger.com/more-information.html

4. Ardamax Keylogger

www.ardamax.com/keylogger/www.mykeylogger.com/keystroke-logger/powered-keylogger/

6. ELITE keylogger

www.elite-keylogger.com/elite-keylogger-spy-software.html

7. Quick kylogger

www.quick-keylogger.com/more-information.html

8. Spy keylogger

www.spy-key-logger.com

9. Perfect keylogger

http://blazingtools.com/bpk.html

10. Invisible keylogger

www.invisiblekeylogger.com

11. Actual spy

www.actualspy.com

12. Spytector ftp keylogger

www.spytector.com

13. IKS software keylogger

http://amecisco.com/iks2000.htm

14. Ghost keylogger

www.sureshotsoftware.com/keyloggerlite/index.htmlI think this is enough.

Remember in hacking google.com is only ur pet (doggy), that can sniff treasures for U.

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Hostgator Discount Code