How to: Detecting And Destroying Keyloggers installed in Computer



There is another post as concerned with security, keeping your online presence secure, fighting with keyloggers, spam and much more. So, I am going to share some security tools and tips for my readers so that they may not fall prey of such criminals and fraudulent activities. Since, With the help of keylogger any hacker can hack into bank acounts of victim.

Types of Keyloggers:
Hardware keylogger - We can detect is easily, As it may be attached to a keyboard or also at the back of the cpu. Your eyes and experience can help you out.

Software keylogger - It is bit difficult to detect, Not yet impossible. Such keyloggers get into your computer because you get fooled by the hacker due to certain social engineering tricks. These keyloggers can be installed remotely as well as on cause of physical access to computer. There are softwares (Spy blockers) which won't detect them as keyloggers or some spy because often keyloggers are used for survey purpose. Yes, it is true also. Now, I,ll show you some tricks below which a smart hacker can use to fool you easily:
1) He may call his remote keylogger as crack of patch of a software which is not free and thus you will download and will run it, FINISH, It will record and send you all key strokes. Now, what was missing? yes a good spyware of antivirus software. You don't need to spend a peny for it, Hackers thirst will give you some freeware and also patched softwares.
2) He may change the icon of the .exe file ( Romote keylogger) to some kinda image file or video so that you may click it immediately without noticing the extension.

And there may be many tricks it depends upon the mind of the attacker.

How remote keyloggers send logs?
Yes, Its a good question which may be coming in your mind. Well, I have examined many keyloggers personally. We can use two communication methods for getting logs. First is email and second easy option is ftp. Now, It will be clear, that when we make a server or attacking file which will attack other computer remotely if the vicitm opens it, We shall give our ftp login information or a gmail email address (Gmaill suits better for keylogging) for ftp the hacker can get a free t35.com or 110mb.com account or else he can have a personall hosting. The logs will be uploaded to the free hosting via ftp after every second. And vicitm computer will upload it silently. Same is the case with email address. RAT's are more dangerous, I have created couple of posts for RAT,s too. You should read them.

Some Softwares to keep such softwares out of computer:
Ad-Aware gives you comprehensive malware protection. With real-time monitoring, threat alerts, and automatic updates you can rest easy knowing that you are protected.
Shop, bank, and make travel arrangements online - It will keep you safe from password stealers, keyloggers, spyware, trojans, online fraudsters, identity thieves and other potential cyber criminals.
Control your privacy - Erase tracks left behind while surfing the Web - on browsers such as Internet Explorer, Opera, and Firefox - in one easy click.
Get Peace of Mind - Know that your personal information is kept safe from dangerous intruders and prying eyes.


Download Ad-Aware

Spyware Blaster - Prevents the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted software.
It blocks spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
It restricts the actions of potentially unwanted sites in Internet Explorer.

Download Spyware Blaster
spyware blaster


SPYBOT - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies.

If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware.



Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there's no harm giving it a try to see if something has invaded your computer.
DOWNLOAD Spybot

Detecting and Killing Keylogger manually:
There is a simple way to do this, As most of the keyloggers can be terminated by using this method. Press ctrl+alt+delete and start task manager. Here come to processes, and kill down any miscellaneous activity shown there like server.exe or if you get there any name which sounds like keylogger related software in the description shown there. Then investigate and kill that process. Well all this depends upon you experience so, i,ll suggest using this Free Antivirus (Eset Smart Secuirity). We are giving this for free. Install it and whenever you will download a miscellaneous file it will detect it. You can also use KL-Detector. It will work by scanning your local hard disk for any log file created during the monitoring process. Most keyloggers will eventually save the recorded data into a location in the hard disk. KL-Detector will inform you of such log file. This way, the program can detect all keyloggers, both known and unknown. Use KL-Detector to detect keylogger in public computer before you enter your password, credit card info, etc also its quite handy too, You can take it any where.
DOWNLOAD KL-Detector here.

0 comments: