Lets first understand keyloggers and keylogging: Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software. here i am discussing only software keyloggers.
What is a Keylogger?
The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work.
In simple words KeyLogger Software allows you to find out what other users do on your computer in your absence. Key logger invisibly records keystrokes of every user activity performed on the computer in encrypted log files with option to send the details at specified email id.
How Keylogger works?
Once the keylogger is installed on a PC, it starts operating in the background (stealth mode) and captures every keystroke of the victim on that PC. Let’s take up a small example: The victim goes to http://mail.yahoo.com/ and types his “username” and the “password” in the respective fields to login. The keylogger silently records these keystrokes and stores them in the logs. These logs when opened up shows the captured “username” and “password” and will also tell you that they were typed in the Yahoo login page. Thus the keylogger loads upon every startup, runs in the background and captures each and every keystroke.
How to install the keylogger?
A keylogger can be installed just like any other program. Just follow the instructions and you’re done.
After installation of the keylogger can the victim come to know about it’s presence?
No. The victim will never come to know about the presence of the keylogger on his computer. This is because, once installed the keylogger will run in total stealth mode. Totally invisible to anti-viruses and anti-spyware, Unlike other programs it will never show up in start-menu, start-up, program files, add/remove programs and task manager. So the victim can no way identify it’s presence on his PC.
Can I be traced back if I install the keylogger on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s PC.
The Best keylogger:-
Today there exists hundreds of keyloggers in the market and most of them are no more than a scam. so here i am discussing a software that is genuine and tested by some great geeks and also it is recognized by BBC, CNN, CBS..etc.
Best Keylogger: SniperSpy (tested)
How SniperSpy works?
After you purchase Sniperspy, you’ll be able to create the installation module using easy set-up program. You need to email this module to the remote user as an attachment.
When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continously.
You can login to your Sniperspy account (you get this after purchase) to see the logs which contains the password.
I don’t have physical access to the traget computer. Can I still install keylogger?
Yes you can. SniperSpy supports REMOTE INSTALLATION feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation all you need to do is just place the module in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).
Can I install Keylogger on a local computer?
If you need to install to your local (current) computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module. Double-click the module filename to execute it. Nothing will appear on the screen as the software is installed.
What if the antivirus block from sending it as an email attachment?
some antiviruses (attachment scanners) may block it, for this do on thing Instead of sending the keylogger as an email attachment, you just place the file in .ZIP/.RAR format and upload it to some file sharing site like http://box.net/ , http://fileden.com/ , http://rapidshare.com/ ..etc. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, the keylogger will get installed automatically.
Some Facts About SniperSpy – why it is the best?
SniperSpy supports REMOTE INSTALLATION feature. This feature is not present on most of the keyloggers.
SniperSpy is fully compatible with Windows 98/ME/2000/XP/Vista and bypasses ANY Firewall.
SniperSpy is more reliable than any other keylogger program. You need not rely on your email account to receive the logs. Instead you can just login to your online SniperSpy account to receive the logs.
SniperSpy captures full-size screenshots of the activities on the target PC.
Records BOTH sides of chats / IMs in Google Talk, Yahoo IM, Windows Live and more.
SniperSpy is more easy to install and requires no extra knowledge.
SniperSpy is recognized by BBC, CNN, CBS and other news networks. Hence it is reputed and trustworthy.
Some keyloggers capture screens, rather than keystrokes.
Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.