{"id":357,"date":"2019-12-12T23:58:08","date_gmt":"2019-12-12T23:58:08","guid":{"rendered":"https:\/\/osintme.com\/?p=357"},"modified":"2020-04-16T21:17:40","modified_gmt":"2020-04-16T21:17:40","slug":"osint-me-tricky-thursday-2","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2019\/12\/12\/osint-me-tricky-thursday-2\/","title":{"rendered":"Osint Me Tricky Thursday #2 &#8211; Keyloggers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"357\" class=\"elementor elementor-357\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-406cf19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"406cf19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06fe5f1\" data-id=\"06fe5f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fca31d7 elementor-widget elementor-widget-text-editor\" data-id=\"fca31d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Welcome back to my irregular, random Thursday spot of tips and tricks!<\/p><p>This time around I would like to focus on <strong>KEYLOGGERS<\/strong> and share some tricks on how to detect and avoid them.<\/p><p>Keyloggers come in two types &#8211; hardware and software. Essentially, both types are digital surveillance tools that <strong>capture and record<\/strong> anything that you type on your computer&#8217;s keyboard.\u00a0<\/p><p>Keylogger targets are many &#8211; from private emails to website login credentials, from credit card numbers to PIN codes for your online banking.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8bab52e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bab52e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fae0ef1\" data-id=\"fae0ef1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06e576e elementor-widget elementor-widget-heading\" data-id=\"06e576e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">1. How to spot a hardware keylogger<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-200299c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"200299c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cf683c\" data-id=\"3cf683c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82c3c13 elementor-widget elementor-widget-text-editor\" data-id=\"82c3c13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For somebody to install a hardware keylogger, they need physical access to your computer. Hardware keyloggers are small, cheap USB devices (circa 10 euro) that are placed into the USB ports between the keyboard and the computer&#8217;s USB panel on the motherboard.<\/p><p>Newer keyloggers can connect to local WiFi and send captured keystrokes in real time to the attacker.<\/p><p>To spot keyloggers, you must:<\/p><ol><li>Be familiar with your hardware and what is NOT part of it.<\/li><li>Conduct a visual examination of USB ports at the back of the machine.<\/li><\/ol><p>\u00a0<\/p><p>This is what you should look for:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-031090d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"031090d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d858175\" data-id=\"d858175\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-016961b elementor-widget elementor-widget-image\" data-id=\"016961b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"194\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/12\/Usb-keylogger.jpg?fit=300%2C194&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-359\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/12\/Usb-keylogger.jpg?w=440&amp;ssl=1 440w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/12\/Usb-keylogger.jpg?resize=300%2C194&amp;ssl=1 300w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c639500 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c639500\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7f6aad4\" data-id=\"7f6aad4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7886ad8 elementor-widget elementor-widget-image\" data-id=\"7886ad8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"201\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/12\/wifi-keylogger.jpg?fit=300%2C201&amp;ssl=1\" class=\"attachment-medium size-medium wp-image-360\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc1a548 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc1a548\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ffc879\" data-id=\"8ffc879\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17cb904 elementor-widget elementor-widget-heading\" data-id=\"17cb904\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">2. Signs of a software keylogger<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3185df5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3185df5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c85ef5d\" data-id=\"c85ef5d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-283a71a elementor-widget elementor-widget-text-editor\" data-id=\"283a71a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Software keyloggers can appear on your system as result of an infection with malicious software.<\/p><p>Like any malware, they sometimes manifest themselves on a target system by slowing it down.<\/p><p>What to look out for:<\/p><ul><li>Keystrokes and mouse lagging while typing<\/li><li>Suspicious processes running in the background (on Windows machines, go &#8220;Ctrl-Alt-Delete&#8221; to access the Task Manager and search for unfamiliar processes)<\/li><li>Unexpected error codes while loading websites containing a lot of text and graphics<\/li><li>Unfamiliar programs installed on your system<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8bafc3a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bafc3a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e7208b4\" data-id=\"e7208b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e8ca2e elementor-widget elementor-widget-heading\" data-id=\"1e8ca2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TRICKS TO TRICK A KEYLOGGER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-610e013 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"610e013\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd87170\" data-id=\"fd87170\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b937764 elementor-widget elementor-widget-text-editor\" data-id=\"b937764\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Using hardware 2FA<\/strong> <strong>on your accounts<\/strong> &#8211; this will not prevent keylogging, but in the case where somebody has your login credentials, they won&#8217;t be able to compromise the account without the physical 2FA security token.<\/li><li><strong>Using a password manager<\/strong> &#8211; not typing in your passwords will not expose them to a keylogger.<\/li><li><strong>Using a virtual keyboard<\/strong> &#8211; no keystrokes on the physical keyboard means no keystrokes to intercept. Keyloggers are not programmed to capture virtual keyboard activity.<\/li><li><strong>Installing key encryption software<\/strong> &#8211; this type of software encrypts the keystrokes before they reach the application, meaning that what you type is obfuscated and can&#8217;t be intercepted.<\/li><li><strong>Using keystroke interference software<\/strong>\u00a0 &#8211; it introduces random keystrokes and confuses the attacker who won&#8217;t know what keystrokes are genuine password letters and which are not.<\/li><li><strong>Installing anti-keylogger software<\/strong> &#8211; used specifically for detecting and alerting users to the presence of keyloggers.<\/li><li><strong>Using a live-USB operating system<\/strong> &#8211; running a default configuration on an OS from a USB ensures that nobody had any chance to install any malicious software on the machine.<\/li><li><strong>Configuring a firewall<\/strong> &#8211; use the highest security setting to force programs to always ask for permission before running.<\/li><li><strong>Using one time passwords<\/strong> &#8211; OTPs are ad hoc generated passwords that are valid for only one login session or transaction on a given machine.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tricky Thursday focuses on keyloggers. Keyloggers come in two types &#8211; hardware and software. Essentially, both types are digital surveillance tools that capture and record anything that you type on your computer&#8217;s keyboard. Check out my methods of detecting and defending against keyloggers.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"default","neve_meta_container":"default","neve_meta_enable_content_width":"off","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"off","neve_meta_disable_footer":"off","neve_meta_disable_title":"off","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[53,54,14,22,28,26],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-keylogger","tag-password","tag-privacy","tag-surveillance","tag-techniques","tag-tricky-thursday"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":8,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"predecessor-version":[{"id":708,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/357\/revisions\/708"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}