Advance Ethical Hacking with Keylogger and safety | And… — Transcript

Learn advanced ethical hacking using keyloggers, virtual keyboard security, and hardware keyloggers for smartphone and computer spying.

Key Takeaways

  • Keyloggers can capture all typed data, screenshots, and program activity, posing serious privacy risks.
  • Virtual keyboards help protect sensitive inputs from keyloggers but can be bypassed by advanced powered keyloggers.
  • Hardware keyloggers provide a stealthy method to record keystrokes without software installation.
  • Using virtual keyboards and being aware of keylogger threats is crucial for secure online banking and shopping.
  • Multiple software and hardware keylogger options exist, each with different capabilities and detection risks.

Summary

  • The video explains how keyloggers like Refog record keystrokes, screenshots, program activity, and visited websites on a victim's computer.
  • It demonstrates how keyloggers capture sensitive data such as passwords and emails, highlighting the risks of online banking and shopping.
  • Virtual keyboards are introduced as a security measure to prevent keyloggers from capturing passwords by using mouse clicks instead of keystrokes.
  • The video discusses powered keyloggers that can bypass virtual keyboard protection by recording mouse movements and screen activity.
  • Several keylogger software options are recommended, including Perfect Keylogger, Aobo Keylogger, and Spytech SpyAgent.
  • Hardware keyloggers are explained as physical devices installed between a keyboard and CPU to capture keystrokes without software installation.
  • The video shows how hardware keyloggers can be used in environments like offices, cyber cafes, and business centers for covert spying.
  • It mentions USB keyloggers that look like pen drives and can be plugged into computers to record keystrokes.
  • The video briefly references a Trojan called Robo Nanny that can secretly record audio.
  • Overall, it covers ethical hacking techniques, keylogger functionalities, and safety measures to protect sensitive information.

Full Transcript — Download SRT & Markdown

00:00
Speaker A
The way that it will record all the keys that your friend is typing, and maybe next week or X number of days later, it will automatically email the keylog file to you or the keylogger log file to you.
00:15
Speaker A
So I'm just waiting for Refog to open up on my computer so I can give a demonstration to all of you. It's taking some time to open. Let's just wait. Okay, I think it's finally open on my machine.
01:06
Speaker A
So I'm gonna show you the log files. All right, so finally the Refog key log has opened on my computer, and this is what the log data looks like. So on the left-hand side, if you notice in the top left corner, there is a link
01:50
Speaker A
which says keystrokes typed, and as soon as I click on that link, all the keys that have been recorded on this computer will get displayed. So I've been running this on my laptop for several days now, so while I
02:06
Speaker A
installed it now, it was actually already installed, which is why it's taking some time for it to open. So if you notice, everything that I had typed as on 1st October, August, which was yesterday, was recorded.
02:22
Speaker A
Right, so I opened up some website, that got recorded. I typed something into an email, that got recorded. So whatever was typed, it tells you the window name of the window where it was typed. It also tells you what
02:37
Speaker A
exactly was typed over there. Thank you so much, Satyam, or some social, gives you tips, this and that. So right, so whatever was typed gets recorded. If I type my password, my password will also get recorded over here.
02:51
Speaker A
Secondly, on the left-hand side, the second option is screenshots. So not only can you record all the keys that are being typed on the victim's computer, you can also take screenshots of what was displayed on the victim's computer
03:04
Speaker A
at different points of time. So every five minutes, it is configured to take a screenshot. So you can decide how often you want screenshots to be taken. So all the screenshots of whatever websites, whatever documents I had displayed on my computer have been
03:20
Speaker A
displayed on the screen. They also have the ability to record program activity, where it will record all the applications that will launch on this computer, and then you can also record which websites were visited on this computer.
03:35
Speaker A
So if you want to find out all the educational websites that your friends are visiting, you can actually just install this keylogger on the computer, and it'll keep a record of everything that is happening on the machine as
03:47
Speaker A
simple as that. So Refog is pretty dangerous. It is pretty easy to hide so that it does not get detected easily, and it is fabulous as well. Now, once a keylogger like Refog has been installed on the victim's computer,
04:07
Speaker A
it will obviously start recording all the keys that the victim is typing. So the next time the victim logs into their bank account, for example, if they type the username and password, the username and password gets recorded. So online banking
04:25
Speaker A
is becoming dangerous because if you use, if you enter your credit cards online or if you enter your bank account details online or your username and password online, a keylogger can record it, which is why a lot of banks are nowadays using
04:40
Speaker A
something known as virtual keyboards, where instead of typing using your keyboard, instead of typing the password using your keyboard, you have to move your mouse and press your password on a virtual keyboard that is displayed on the screen. So let me quickly give a
04:56
Speaker A
demonstration of that to all of you. So say, for example, Citibank, which is one of the world's leading banks, has this security feature where if you click on the login button on the home page, it will show you the login screen.
05:12
Speaker A
So let's wait for the login screen to show up. Now, this is the login screen of Citibank. You need to type in your username in the space provided, and then you need to type in your password as well.
05:28
Speaker A
But you can't use your keyboard to enter the password. You need to enter the password using this virtual keyboard, as simple as that. So now, even if my computer has been infected with a Trojan or a keylogger,
05:44
Speaker A
it will not be able to record my password because I'm not typing my password. I am using my mouse to enter the password. So this is a great security solution to reduce the threat of Trojans and keyloggers. So if you are worried
06:00
Speaker A
that your computer is infected with a keylogger or a Trojan, make sure that you use virtual keyboards to do sensitive transactions like online banking and online shopping. So now criminals have a problem, and the problem that the criminals have
06:20
Speaker A
is that victims are using virtual keyboards to do their online banking and shopping, and the criminal still wants to find a way to record the password of the victim. So the question here is, how do you hack virtual keyboards? How do you find out
06:37
Speaker A
somebody else's password if they're using a virtual keyboard to enter the password? And the solution is something known as powered keylogger. Powered keylogger is a software that claims to be undetectable. Not only will it record all the keys that you're
06:55
Speaker A
pressing on the victim's computer, but at the same time, it will record the mouse movements as well. So imagine it will take a screenshot of the screen, and whenever you press or click the mouse or press the mouse
07:08
Speaker A
button, it'll take a screenshot. So you'll know exactly which keys were pressed on a virtual keyboard. So powered keylogger is able to hack a virtual keyboard as well and is able to record somebody else's password even if the password is being entered using a
07:24
Speaker A
virtual keyboard and not a traditional standard physical keyboard. There's another keylogger which I like to recommend to all of you. It's called Perfect Keylogger. It works on Mac platforms as well, not only Windows. There's another keylogger called Aobo
07:41
Speaker A
Keylogger, Aobo Keylogger, and then Spytech SpyAgent Keylogger. And you could also end up using a hardware keylogger. So imagine that you go for a meeting to some company, and you want to find out what they are
08:12
Speaker A
typing on their system, but you don't have access to their computer. So you don't have the time to, you know, crack the password of the Windows and then install a keylogger or anything like that. You don't even know
08:24
Speaker A
their email address, so you can't email the keylogger to them. But you are in the office, and you have maybe two, three minutes with you, and you want to somehow install something so that whatever they are typing on their machine, you can record.
08:38
Speaker A
So you can actually make use of a hardware keylogger. So hardware keylogger looks like what you are seeing on the screen. You can see the image on the screen. It's basically a small device that sits between the CPU and the keyboard of a desktop.
08:58
Speaker A
So if you remember, a desktop typically has a keyboard, and the keyboard, there's a wire that connects to the CPU. So from keygoes.com, this particular website, you can actually buy a physical hardware keylogger where one end of the
09:18
Speaker A
keylogger you connect to the wire connecting to the keyboard, and the other end you plug into the CPU. So imagine it's just a small device that sits, a physical device that sits between the wire coming from the keyboard and the CPU. So
09:36
Speaker A
now whatever gets typed in that keyboard, it has to be sent to the CPU, but it goes via this keygoes hardware keylogger, and this keygoes hardware keylogger has built-in memory, so everything gets stored on it. And maybe one week later, you come back to
09:53
Speaker A
the office, just get this physical device again and go back home, and you'll be able to see all the keys that were pressed on the computer. A lot of criminals do this in cyber cafes or hotel business centers or also
10:09
Speaker A
corporate companies. And the website is keygoes.com. From the same website, you can also purchase a USB keylogger, which looks just like a pen drive, but actually it's a keylogger. So you can just plug it to the CPU where the USB drives up or to
10:32
Speaker A
the laptop and then record whatever gets typed on the computer. There's another Trojan called Robo Nanny, which allows you to secretly record audio using the built-in microphone of a computer remotely through the internet. You have another Trojan called Net Video
10:54
Speaker A
Spy, which al...
11:18
Speaker A
particular computer see a very common problem for companies is that a lot of time their employees the way they steal something confidential is by taking a print of it so how do you keep track of what was printed by which user at what time
11:36
Speaker A
so printer activity monitor allows you to do that we are running out of time but in the last 10 minutes of today's lecture I like to talk about my favorite portion of today's lecture which is a technique called mobile phone spying
11:54
Speaker A
now I actually get a lot of emails from people and Facebook messages from people saying that I think my boyfriend or girlfriend is cheating on me can you please help me hack into the Facebook account or their email account
12:12
Speaker A
so I can find out who they are chatting with who they are emailing and who they are sending photos to and so on now whenever I get such an uh such a message I don't actually reply because I think it's obviously illegal
12:28
Speaker A
to hack into somebody else's Facebook or mobile phone or you know WhatsApp and find out who they are chatting with who they are calling and things like that but today let me show you how easy it is to do that
12:41
Speaker A
so the name of the talk topic is mobile phone spine mobile phone spying is a technique that allows you to spy upon somebody else's mobile phone and find out who they are calling who they are messaging on WhatsApp or SMS or where they are
12:58
Speaker A
going as well so imagine the following scenario imagine that I am your friend and I study in the same College as you or I work in the same company as you and I want to spy upon everything that's
13:12
Speaker A
happening on your mobile phone so what do I do I'll come up to you and pretend that oh you know I am out of battery or my balance is over I need to make a very urgent phone call can I please borrow
13:25
Speaker A
your phone and most people they'll give their phone to their friends or colleagues so obviously you will give your phone to me and that's gonna be the biggest mistake of your life because the moment you give your phone to me I'm gonna pretend that
13:39
Speaker A
I'm making a phone call but actually I'll secretly open your browser and I'll download a spying Trojan or software onto your phone after a few minutes I'll return the phone back to you and the best part is the Trojan that
13:55
Speaker A
I've installed on your phone it's completely hidden in other words when you scroll left or right or up and down on your phone there will be no new icon or notification that will appear anywhere on your phone it's completely hidden
14:11
Speaker A
so I've given this phone back to you you go back home I go back home now once I go back home I will log on to the spying software's website I log into my account and now I'll be able to see everything
14:25
Speaker A
that's happening on your mobile phone for example if you make any phone calls if you receive any phone calls if you get any missed calls then tag call log I can see on this website if you send any sms's or receive
14:40
Speaker A
messages or send WhatsApp messages or receive them I can read all those messages on the website and if you take any video or take any photos using your phone a copy of that video or photo will be available to me
14:53
Speaker A
on the website and the best part is if your phone is GPS enabled which nowadays most of the phones are then when I log on to that website there will be a Google map that will be displayed and
15:06
Speaker A
that Google Map will show me your exact physical location using the GPS of your phone at any given point of time so imagine if your girlfriend tells you that she cannot meet you because she's spending time at home with her parents
15:23
Speaker A
but when you log on to that website uh you find out that your girlfriend is sitting in bandra Bandstand then you know that something very wrong is going on so that is how you can actually find out if somebody is cheating on you or
15:37
Speaker A
Not by simply installing a spyware or a Trojan on their mobile phone and the name of the software that allow you to do this the name of the Trojan is the following you have Spy Phone gold Mobile Spy
15:57
Speaker A
and then you have flexi Style so Spy Phone gold Mobile Spy and flexi spy and all of them are available as a download from the internet they are unfortunately not free they are paid software and they work on Android phones
16:15
Speaker A
iPhones Windows phones but they will not work on Old Nokia phones so if your girlfriend is still using an old Nokia phone then these tools these Trojans will not work so all you gotta do is wait for your girlfriend's
16:36
Speaker A
birthday gift her a brand new Android phone she'll be very happy with you that you've bought her such a nice birthday gift but in reality you will also be able to Now record everything that's happening on her mobile phone as simple
16:52
Speaker A
as that so what are the solutions that you can Implement to protect yourself against this kind of an attack first of all never give your phone to anybody so even if it is your best friend asking you for uh your phone do not give your
17:11
Speaker A
phone because they are probably or they may actually misuse your phone and infect it secondly if you suspect that somebody has already infected your computer with a rather your mobile phone with a Trojan you basically need to do a factory reset
17:27
Speaker A
by going into the settings or you need to choose the option called Erase all apps because it's not as if the Spy Phone gold Trojan will be installed using that name the name of that could be something like
17:43
Speaker A
Android update or something like that so you won't be able to figure out which application to uninstall so you need to erase or uninstall all the apps from your mobile phone so that's basically what mobile phone spying is all about and that's how you
18:01
Speaker A
can basically get rid of mobile phone Trojans I also wanted to talk about how to remove uh fully undetectable projects from your computers but unfortunately we have only a couple of minutes left in today's lecture so I won't be able to finish
18:18
Speaker A
that or cover that today but I will definitely start the next lecture with that particular topic now the next lecture we will continue where we have ended this lecture in today's lecture we kind of talked about spoofing attacks
18:32
Speaker A
like email spoofing SMS spoofing and so on and then we moved on to Trojans where I discussed how you can actually use a Trojan to remotely control somebody else's computer and we discuss each and every step of how to use a Trojan and
18:47
Speaker A
then we also saw how to use fully undetectable Frozen so that it does not get detected by antivirus software installed on the victim's computer we discuss reverse connection Trojans as well and then we discuss key loggers in detail and then we also discuss mobile
19:02
Speaker A
phone Trojans and how to remove them from your computer so I hope all of you enjoyed this but particular lecture for the first time we have started talking about step number three and step number four which is attacking the victim's
19:17
Speaker A
computer actually entering the victim's computer so now for the rest of the course that's all we're gonna talk about which is in my opinion the most exciting part of hacking or ethical hacking or cyber security so I hope all of you
19:32
Speaker A
enjoyed this lecture until the next lecture of afch this is Ankit fadia signing off
Topics:ethical hackingkeyloggervirtual keyboardhardware keyloggerspy softwareRefogonline banking securitypowered keyloggerPerfect KeyloggerUSB keylogger

Frequently Asked Questions

What is a keylogger and how does it work?

A keylogger is software or hardware that records all keystrokes typed on a computer. It can capture passwords, emails, websites visited, and even take screenshots to monitor user activity.

How do virtual keyboards protect against keyloggers?

Virtual keyboards require users to click on-screen keys with a mouse instead of typing on a physical keyboard, preventing traditional keyloggers from capturing password inputs.

Can keyloggers record passwords entered via virtual keyboards?

Yes, advanced powered keyloggers can record mouse movements and take screenshots when mouse clicks occur, allowing them to capture passwords entered on virtual keyboards.

Get More with the Söz AI App

Transcribe recordings, audio files, and YouTube videos — with AI summaries, speaker detection, and unlimited transcriptions.

Or transcribe another YouTube video here →