Install and use a keylogger as shown in Project 2-2, page 71. Provide screenshots of steps 1, 4, 6, 11, 14. Answer question in step 14. Also answer this question: how would you attempt to install a keylogger to a computer for which you did not know a user name and password?
Answer 2
Keyboard Collector is the process of capturing all the action of keyboard in the form of log.
There are various types of these kind of programs, one of them is "SpyBoss Pro" which even log every action of the computer as like the web site that has been browsed and the contents of its pages and the log can be viewed in the form of text format or in the program it self.
(Step01)
The following is the Google search page in which the Keyboard collector is being searched in the following way

(Step 04)
To run the following program , go to Start and Run the SpyBoss Pro program, the following figure is the interface page of the program, where many function are available
(Step 06)
To activate the key logger program we have to click on the button "Start Capture" button, after clicking , it ask for the file name to be labelled for log file name in order for future reference and to ease of search
(Step 11)
After capturing to view the saved log file, we can directly click on Open Log button on the left hand side of the SpyBoss Pro or by directly click on the text file of the desired date and name as saved before. There is even more additional way to view the log which is very interactive style which can be acquired by clicking on Playback button which shows all the log in very interactive way.
(Step 14)
To view all the programs that are currently running, Click the Applications tab on the Windows Task Manager
The reason of the screenshot being used is to show that the Keyboard controller or keylogger or SpyBoss Pro would not appear in the Application tab, because it works at the background , its main theme is for security or hacking reasons which has to be made hidden in order to log the every action that has been used by the user of any type.
Hackers use these kind of program to find out the desired information in order to attack the site, to make unauthorised access and for various reason and on the other hand System and Security Administrator uses such kind of programs for security reason. This is the reason that itwon't appear in the Application tab of Task manager.
In case we don't have the authentication data like username and password, in the graphical mode it is not possible but if we can access the particular computer in the command propmt i any case we can install the key logger program by use of Command program.
No comments:
Post a Comment