A hardware keylogger is a tiny electronic device capable of capturing keystrokes from a PS/2 or USB keyboard. A keylogger contains advanced electronic circuitry for monitoring a keyboard's USB or PS/2 connection, filtering keystroke data, and recording the data to internal memory. The built-in memory typically has several megabytes (or even gigabytes), meaning it can hold years-worth of typing.
A hardware keylogger is completely undetectable for software running on the computer, such as anti-virus programs and security scanners. A hardware keylogger also requires no software or drivers, meaning the installation process can be done in a matter of seconds. Just plug the keylogger in-between the keyboard and the USB or PS/2 socket on the computer's rear side.
The KeyGrabber USB is a best-seller in the general-purpose USB keylogger segment. By entering the password the KeyGrabber USB keylogger may switch into a USB flash drive, providing instant access to the entire log file.
The KeyGrabber USB hardware keylogger is valued by customers for its compatibility with all types of USB keyboards, including wireless keyboard, Mac keyboards, and keyboards with built-in hubs. Unlike other keyloggers available on the market, the KeyGrabber USB is completely undetectable for software.
One of the newest evolvements in hardware keylogger technology are keyloggers with remote access. Keelog has created the most advanced keyloggers on the market, named the AirDrive Keylogger and AirDrive Forensic Keylogger.
The AirDrive series of keyloggers incorporates a built-in WLAN transceiver, Access Point, and TCP/IP stack, meaning you can connect to it over Wi-Fi. Once connected, you can view the data log, download it, or reconfigure the device. The more sophisticated Pro and Max versions also have the capability of sending E-mail reports with captured keystroke data to any recipient E-mail address you supply. This means you can keep track of what's happening on the monitored computer from any place throughout the world, just by checking your mailbox! The AirDrive Keylogger family also has the capability of time-stamping and live data streaming of captured keystroke data. This makes it possible to create entire networks of wireless keyloggers - a solution that is particularly recommended for monitoring several computers in a household, or controlling employee productivity in companies, or acquiring data from barcode scanners.
Software keyloggers are considered to be an alternative to hardware keyloggers. However, they inherit all the problems any other software security application would have:
Keelog is the leading manufacturer of hardware keyloggers. The KeyGrabber and AirDrive series of keyloggers has sold in 100,000+ units worldwide, making it the most successful product in its class. Keelog has created the concept of a keylogger operating as a USB stick for retrieving data, which is the standard mode of operation for modern keyloggers. Keelog has also introduced the first PS/2 keylogger with USB data retrieve, the first Wi-Fi wireless keylogger, and the first miniature video-loggers. For more information, go to the about us page.
The KeyGrabber TimeKeeper series contains a built-in time-tracking module and battery. The keylogger will create time and date stamps in the log file, meaning you can gain information not only what keys were pressed, but also the exact time they were pressed. The TimeKeeper series is targeted especially at forensic applications, where timestamps often are a crucial part of evidence. TimeKeeper keyloggers, just like all other KeyGrabber products, offer the option of data encryption with a 128-bit key. This ensures that the data has not been tampered with and may serve as legal evidence.
A hardware keylogger is a clever concept, but it primarily provides keystroke information. It cannot provide much information about what was really happening on the target computer. Why not take key logging to the next level and log entire screenshots instead of only keystrokes? That's precisely what Keelog did with the world's first hardware video-logger: the VideoGhost.
The VideoGhost is a tiny frame grabber that silently records screenshots and stores them as JPEGs to an internal 2GB flash disk. Simply connect the video-logger to the computers DVI, VGA, or HDMI port, and it will automatically take a snapshot every few seconds. To view the recorded images, simply switch the device to flash drive mode, and it'll pop-up as a removable disk containing recorded JPEGs. Just like hardware keyloggers, the VideoGhost video-logger is a purely electronic device, meaning it requires no software or drivers, and does not interfere with the standard video transmission to the monitor or TV.
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard,[1][2] typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware.
While the programs themselves are legal,[3] with many designed to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other confidential information.[4][5] Keystroke logging can also be utilized to monitor activities of children in schools or at home and by law enforcement officials to investigate malicious usage.[6]
Keylogging can also be used to study keystroke dynamics[7] or human-computer interaction. Numerous keylogging methods exist, ranging from hardware and software-based approaches to acoustic cryptanalysis.
In the mid-1970s, the Soviet Union developed and deployed a hardware keylogger targeting typewriters. Termed the "selectric bug", it measured the movements of the print head of IBM Selectric typewriters via subtle influences on the regional magnetic field caused by the rotation and movements of the print head.[8] An early keylogger was written by Perry Kivolowitz and posted to the Usenet newsgroup net.unix-wizards, net.sources on November 17, 1983.[9] The posting seems to be a motivating factor in restricting access to /dev/kmem on Unix systems. The user-mode program operated by locating and dumping character lists (clients) as they were assembled in the Unix kernel.
A software-based keylogger is a computer program designed to record any input from the keyboard.[15] Keyloggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Families and businesspeople use keyloggers legally to monitor network usage without their users' direct knowledge. Microsoft publicly stated that Windows 10 has a built-in keylogger in its final version "to improve typing and writing services".[16] However, malicious individuals can use keyloggers on public computers to steal passwords or credit card information. Most keyloggers are not stopped by HTTPS encryption because that only protects data in transit between computers; software-based keyloggers run on the affected user's computer, reading keyboard inputs directly as the user types.
Since 2006, Keystroke logging has been an established research method for the study of writing processes.[21][22] Different programs have been developed to collect online process data of writing activities,[23] including Inputlog, Scriptlog, Translog and GGXLog.
Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.
Researchers Adam Young and Moti Yung discussed several methods of sending keystroke logging. They presented a deniable password snatching attack in which the keystroke logging trojan is installed using a virus or worm. An attacker who is caught with the virus or worm can claim to be a victim. The cryptotrojan asymmetrically encrypts the pilfered login/password pairs using the public key of the trojan author and covertly broadcasts the resulting ciphertext. They mentioned that the ciphertext can be steganographically encoded and posted to a public bulletin board such as Usenet.[44][45]
In 2000, the FBI used FlashCrest iSpy to obtain the PGP passphrase of Nicodemo Scarfo, Jr., son of mob boss Nicodemo Scarfo.[46]Also in 2000, the FBI lured two suspected Russian cybercriminals to the US in an elaborate ruse, and captured their usernames and passwords with a keylogger that was covertly installed on a machine that they used to access their computers in Russia. The FBI then used these credentials to gain access to the suspects' computers in Russia to obtain evidence to prosecute them.[47]
An anti-keylogger is a piece of software specifically designed to detect keyloggers on a computer, typically comparing all files in the computer against a database of keyloggers, looking for similarities which might indicate the presence of a hidden keylogger. As anti-keyloggers have been designed specifically to detect keyloggers, they have the potential to be more effective than conventional antivirus software; some antivirus software do not consider keyloggers to be malware, as under some circumstances a keylogger can be considered a legitimate piece of software.[49]
b1e95dc632