키로거 란 무엇인가
Contents
키로거 란 무엇인가
웹에는 키로거에 대한 많은 정보가 있지만 키로거의 개발 및 사용에 대한 수많은 뉘앙스를 자세히 설명하는 기사를 찾기가 실제로 어렵습니다.
이것이이 기사가 작성된 이유입니다.
키로거또는 키 스트로크 로거는 컴퓨터 키보드에서 누른 키를 기록하는 소프트웨어 프로그램 또는 하드웨어 장치입니다.
키로거의 동의어는 키 스트로크 로거이며, 수행하는 작업을 키 스트로크 로깅또는 키보드 캡처라고합니다.
소프트웨어 키로거 및 하드웨어 대응 물 (하드웨어 키로거)의 작동은 완전히 다른 두 가지 기술을 기반으로합니다. 즉, 키 입력을 다른 방식으로 기록합니다.
PC 사용자는 다릅니다. 그들은 정보 처리에서 다른 역할을합니다. 특정 사용자는 다음과 같습니다. 운영 체제의 개발자
- 소프트웨어 개발자;
- 기업의 CEO;
- 사업주;
- 회사 컴퓨터 네트워크의 관리자;
- 관리 권한이있는 컴퓨터 사용자
- 직장 PC 사용자;
- 컴퓨터를 소유 한 사용자
- 정보 보안 전문가;
- 등
활동에 키로거를 사용하는 것이 합리적인지 여부를 결정하는 것은이 사람들입니다.
모든 기술을 사용하는 것이 유익하거나 해로울 수 있다는 것은 일반적인 지식입니다. 이것은 컴퓨터를 사용한 정보 처리에도 적용됩니다.
키로거의 법적 사용과 불법 사용 사이의 모호한 선은 어디에 있습니까?
대답은 간단합니다. 키로거가 어떻게 적용되는지에 따라서 만 구별 될 수 있습니다! 보안 관리와 보안 위반 사이의 경계를 확인할 수있는 응용 프로그램의 방법입니다.
무단 사용( 불법 사용)이라는 용어는 로컬 네트워크 (예 : 회사 또는 조직) 또는 특정 개인 컴퓨터의 소유자 (보안 관리자)에 대한 지식없이 키로거가 설치되었음을 의미합니다. "무단 활동"의 개념은 세계 거의 모든 국가에서 "불법 활동"의 개념과 매우 유사합니다.
무단 키로거 (소프트웨어 및 하드웨어 모두)는 스파이 장치또는 스파이웨어( 스파이 소프트웨어, 스파이 프로그램, 키로거)라고합니다.
무단 사용은 일반적으로 불법 활동과 관련이 있습니다. 일반적으로 무단 사용을위한 스파이웨어 제품은 번들 된 실행 파일을 구성 및 수신 할 수 있으며 설치 중에 메시지를 표시하거나 창을 열지 않습니다. 또한 이러한 제품에는 사용자의 컴퓨터에 사전 구성된 모듈을 제공하고 원격으로 설치할 수있는 내장 도구가 있습니다. 즉, 설치 프로세스는 사용자의 컴퓨터에 직접 물리적으로 액세스하지 않고 발생하며 종종 관리 권한이 필요하지 않습니다.
승인 된 사용( 합법적 / 법적 사용)이라는 용어는 키로거가 로컬 네트워크 (예 : 회사 또는 조직) 또는 특정 개인 컴퓨터의 소유자 (보안 관리자)에 대한 지식으로 설치되었음을 의미합니다. 합법적으로 사용되는 키로거 (소프트웨어 또는 하드웨어)는 일반적으로 직원 모니터링 소프트웨어, 자녀 보호 소프트웨어, 액세스 제어 소프트웨어, 개인 보안 프로그램등이라고합니다. 일반적으로 이러한 소프트웨어 제품에는 물리적 액세스가 필요합니다 사용자의 컴퓨터에 대한 관리자 권한이 있어야하며 관리자가이를 구성하고 설치하려면 관리자 권한이 있어야합니다.
What they are used for
Authorized use of keyloggers allows the owner (security administrator) of a local computer network or the owner (administrator) of a computer to:
- identify all the cases when critical words or phrases (i.e. the ones, disclosure of which to third parties will lead to material loss) are typed;
- be able to access the information stored on the computer’s hard drive if the access password is lost due to any reason (the employee’s illness, deliberate actions of the personnel, etc.);
- promptly identify (localize) all cases of brute force attacks;
- check whether corporate personal computers are used outside working time, and if yes, identify what was typed at that time;
- investigate computer incidents;
- conduct scientific research determining how accurate, efficient and adequate were the personnel’s reactions to external influences;
- recover critical information after computer systems’ failures.
Developers of commercial software products can use keylogger-containing modules for many purposes, including the following:
- to develop quick word search systems (e.g. electronic dictionaries, electronic translators);
- to develop programs for quick search for names, companies, addresses (e.g. electronic phonebooks)
Unauthorized use of keyloggers (including hardware or software products with a keylogging module) allows an attacker to:
- intercept other people's information typed on the keyboard;
- get unauthorized access to usernames and passwords people use to access various systems, including bank-client systems;
- get unauthorized access to cryptographic protection of computer users’ information (passphrases);
- gain unauthorized access to credit card authorization data;
Classification of keyloggers
Classification according to the type
Software keyloggers belong to the group of software products that exercise control over activities of a PC user. Initially, software products of this type were intended solely for recording keystrokes pressed of the keyboard, including system keys, and saving these data into a special log file, which was subsequently studied by the person who installed this program. The log file could be sent over the network to a network drive, an FTP server in the Internet, to an email address, etc.
But nowadays, software products that retained the name “keyloggers” perform many additional functions, such as intercepting information from windows, mouse clicks, the clipboard contents, making screenshots of the screen and active windows, keeping records of all received and sent e-mails, tracking file activity and changes in the system registry, recording tasks sent to the printer, intercepting sound from a microphone and images from a webcam, etc.
Hardware keyloggers are miniature devices that can be placed between the keyboard and the computer or integrated into the keyboard itself. They log all the keystrokes made on the keyboard. The keylogging process is completely invisible to the PC user. Hardware keyloggers do not require installation of any software on the target PC in order to successfully intercept all keystrokes. When a hardware keylogger is attached, it does not matter whether the computer is in on or off. Once installed, a hardware keylogger can work for unlimited time, since it does not require an additional power source.
Volume of these devices’ internal non-volatile memory allows recording up to 20 million keystrokes, even with Unicode support. These devices come in lots of shapes, so that even a specialist sometimes fails to detect such a device during an information audit. Depending on the place they are attached, hardware keyloggers can be external and internal.
Acoustic keyloggers are hardware devices that record the sounds from the keys being pressed on the keyboard, analyze these sounds and convert them into text.
Classification by the log file storage location
- HDD;
- RAM;
- registry;
- a local network;
- remote server;
Classification by the means of sending the log file
- E-mail;
- FTP or HTTP (in the local network or the Internet);
- any wireless connection (radio, IrDA, Bluetooth, WiFi, etc. for devices in the immediate vicinity, or, in advanced systems they are used for overcoming air gaps and enabling data leakage from physically isolated systems).
Classification by presence in signature databases
Signatures (small clips of code) of well-known keyloggers are already included into signature databases of reputable manufacturers of antispyware and antiviruses.
Some of unknown keyloggers, whose signatures are not included into signature databases, are likely to remain unknown for a number of reasons, namely:
- keyloggers (keylogging modules) can be developed under the auspices of various governmental organizations;
- keyloggers (keylogging modules) can be incorporated into the core of a proprietary operating system by its developers;
- keyloggers can be developed in a limited number (e.g. in one or several copies) to fulfil a specific task, related to theft of critical information from a user's computer (for example, software products used by professional hackers). These spyware products can be slightly modified open source keyloggers taken from the Internet and compiled by the attacker, which changes the signature of the keylogger;
- commercial keyloggers, especially the ones included as modules into corporate software products, are very rarely included into signature databases of well-known manufacturers of anti-spyware and/or anti-viruses. As a result, if a fully functional version of this software product leaks into the Internet, cybercriminals can turn it into a spyware product that is not detected with common antispyware or antiviruses;
- keyloggers, which are modules for intercepting keystrokes on a user's computer, which are included in virus programs. Before the signature data is entered into the virus database, these modules are unknown. An example is the world-famous viruses that have done a lot of trouble in recent years, incorporating a module for intercepting keystrokes and sending received information to the Internet.
Protection from unauthorized keyloggers
Protection against unauthorized software keyloggers, which are ‘known’, i.e. its signatures are included into signature databases:
- use of antispyware software and/or antivirus software products from reputable manufacturers with automatic updating of signature databases.
Protection from ‘unknown’ unauthorized software keyloggers:
- use of anti-spyware software products and/or anti-virus software products of reputable manufacturers that use so-called heuristic (behavioral) analyzers to counter spyware products, that is, they do not require a signature base.
- use of programs that encrypt data entered from the keyboard. Also, you can use keyboards that perform such encryption at the hardware level.
Protection against unauthorized software keyloggers, both “known” and “unknown”, includes using anti-spyware products and/or anti-viruses from reputable developers. These products counteract spyware products by means of:
- constantly updated signature database of spyware products; or
- heuristic (behavioral) analyzers that do not require a signature base.
Protection against unauthorized hardware keyloggers includes:
- thorough external and internal inspections of the computer systems;
- using virtual keyboards.
The main signs that developers included a keylogging module into a software product
If a software product has a built-in functionality that prompts options for typing the word after a few keystrokes, it means that a keylogging module does its job.
Keylogging modules are an integral part of modern instant messengers, text editors, dictionaries, spell checkers, keyboard layout switching programs, etc.
The danger of such software products lies in the fact that they are not officially considered malicious, as they perform very necessary functions for computer users. But unlike software for parental control or employee monitoring, where all functions are openly announced by their manufacturers (developers), users are not aware of side functions of such seemingly benign programs - even their developers and manufacturers are often silent about them... Nevertheless, cybercriminals can make use of keylogging functions in these products, if they manage to configure this software without your knowledge.