0% found this document useful (0 votes)
9 views9 pages

Green Modern Environment Presentation PDF

recherche keylogging

Uploaded by

imanemaliki257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Green Modern Environment Presentation PDF

recherche keylogging

Uploaded by

imanemaliki257
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

ADVANCED KEYLOGGING

KEYLOGGING
Keylogging is the process of recording or
tracking keystrokes on a computer or device,
often done through software or hardware,
to monitor and capture the user's input.

ADVANCED
KEYLOGGING
Advanced keylogging typically refers to a
more sophisticated and stealthy form of
keylogging, where malicious software or
techniques are employed to covertly capture
and record keystrokes on a computer or
mobile device
CAPABILITIES OF
ADVANCED KEYLOGGING

gather screeshots
computer’s
encryption Clean up our
information captures
tracks

clipboard
microphone
logging and audio email
recording sending
KEYSTROKE LOGGING:
THE PROGRAM USES THE PYNPUT.KEYBOARD
LIBRARY TO RECORD KEYBOARD KEYSTROKES.
KEYSTROKES ARE LOGGED INTO A TEXT FILE
(KEY_LOG.TXT).

SYSTEM INFORMATION GATHERING:


SYSTEM INFORMATION SUCH AS COMPUTER
NAME, IP ADDRESSES (PUBLIC AND PRIVATE),
PROCESSOR, OPERATING SYSTEM, MACHINE
TYPE, IS COLLECTED.
THIS INFORMATION IS STORED IN A TEXT FILE
(SYSEMINFO.TXT).
CLIPBOARD CAPTURE:
THE CLIPBOARD CONTENT IS MONITORED AND
RECORDED.
CLIPBOARD DATA IS STORED IN A TEXT FILE
(CLIPBOARD.TXT).

AUDIO RECORDING (MICROPHONE):


THE PROGRAM RECORDS AUDIO FROM THE
MICROPHONE FOR A SPECIFIED DURATION
(MICROPHONE_TIME).
AUDIO RECORDINGS ARE SAVED AS WAV FILES
(AUDIO.WAV).

SCREEN CAPTURE (SCREENSHOT):


THE PROGRAM TAKES SCREENSHOTS USING
THE PIL (PILLOW) LIBRARY.
SCREENSHOTS ARE SAVED AS IMAGE FILES
(SCREENSHOT.PNG).
EMAIL SENDING:
THE COLLECTED INFORMATION (KEYSTROKES,
SCREENSHOTS,) IS SENT VIA EMAIL.
USES THE SMTPLIB LIBRARY TO SEND EMAILS
THROUGH A GMAIL ACCOUNT.

CLEANING TRACES: FILE ENCRYPTION:


AFTER SENDING INFORMATION, THE PROGRAM BEFORE EMAIL TRANSMISSION, SENSITIVE FILES
DELETES TEMPORARY FILES TO MINIMIZE ARE ENCRYPTED USING THE
TRACES ON THE TARGET SYSTEM. CRYPTOGRAPHY.FERNET LIBRARY.
PREVENTIVE
MEASURES
Use of antivirus tools and software
keeping system security protocols
updated
use the virtual keyboard to input
sensitive information
PROBLEMS:

receive the email encrypted


can’t send email because of the
security
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy