Keystroke logging: Difference between revisions

Content deleted Content added
m Reverted edits by 159.86.185.211 (talk) (HG) (3.1.22)
Rescuing 2 sources and tagging 0 as dead. #IABot (v1.6.1) (Balon Greyjoy)
Line 57:
Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.
 
* Firmware-based: [[BIOS]]-level [[firmware]] that handles keyboard events can be modified to record these events as they are processed. Physical and/or [[Superuser|root-level access]] is required to the machine, and the software loaded into the BIOS needs to be created for the specific hardware that it will be running on.<ref>{{cite web|title=Apple keyboard hack|url=http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed/|work=Apple keyboard hack|publisher=Digital Society|accessdate=9 June 2011}}</ref>
* Keyboard hardware: Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the [[computer keyboard]] and the computer, typically inline with the keyboard's cable connector. There are also [[Universal Serial Bus|USB]] connectors based Hardware keyloggers as well as ones for Laptop computers (the Mini-PCI card plugs into the expansion slot of a laptop). More stealthy implementations can be installed or built into standard keyboards, so that no device is visible on the external cable. Both types log all keyboard activity to their [[Primary storage|internal memory]], which can be subsequently accessed, for example, by typing in a secret key sequence. A hardware keylogger has an advantage over a software solution: it is not dependent on being installed on the target computer's operating system and therefore will not interfere with any program running on the target machine or be detected by any [[Anti-spyware software|software]]. However its physical presence may be detected if, for example, it is installed outside the case as an inline device between the computer and the keyboard. Some of these implementations have the ability to be controlled and monitored remotely by means of a wireless communication standard.<ref>{{cite web|title=Keylogger Removal |url=http://spyreveal.com/keyloggerremoval |work=Keylogger Removal |publisher=SpyReveal Anti Keylogger |accessdate=25 April 2011 |deadurl=yes |archiveurl=https://web.archive.org/web/20110429181147/http://spyreveal.com/keyloggerremoval |archivedate=29 April 2011 |df= }}</ref>
*Wireless keyboard and mouse sniffers: These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked beforehand if the transmissions are to be read. In some cases this enables an attacker to type arbitrary commands into a victim’s computer.<ref>{{cite web|title=Keylogger Removal|url=https://www.bastille.net/technical-details|work=Keylogger Removal|publisher=SpyReveal Anti Keylogger|accessdate=26 February 2016}}</ref>
Line 84:
As of 2013, Russian special services still use typewriters.<ref name="ingersoll" /><ref>{{cite web|url=http://technology.inquirer.net/27149/wanted-20-electric-typewriters-for-russia-to-avoid-leaks|title=Wanted: 20 electric typewriters for Russia to avoid leaks|author=Agence France-Presse, Associated Press|work=inquirer.net}}</ref><ref>
Anna Arutunyan.
[http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html "Russian security agency to buy typewriters to avoid surveillance"].
</ref>