29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hacking For Beginners – Manthan Desai 2010<br />

And you are done we have traced the person.....<br />

And from where he had sent the email.<br />

Keystroke loggers<br />

Keystroke Loggers (or Key loggers) intercept the Target’s keystrokes and either saves them in a file to be read<br />

later, or transmit them to a predetermined destination accessible to the Hacker.<br />

Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide<br />

variety of confidential information, including passwords, credit card numbers, and private Email correspondence,<br />

names, addresses, and phone numbers.<br />

Types of keyloggers<br />

Hardware keylogger<br />

Software keylogger<br />

Some Famous keyloggers<br />

‣ Actual Spy<br />

‣ Perfect Keylogger<br />

‣ Family Keylogger<br />

‣ Home Keylogger<br />

‣ Soft Central Keylogger<br />

‣ Adramax Keylogger<br />

w w w . h a c k i n g t e c h . c o . t v Page 26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!