Solved

Detecting A Keylogger

Posted on 2014-01-13
5
488 Views
Last Modified: 2014-01-16
Hi;

Can anyone recommed some programmes and methods to check a machine for a Keylogger?
0
Comment
Question by:mavcom
5 Comments
 
LVL 19

Assisted Solution

by:helpfinder
helpfinder earned 125 total points
ID: 39776827
antivirusa or antispyware should detect it, you can try to scan with Free Anti-malware product:
http://www.malwarebytes.org/downloads/

Or use some AV solution, e.g. boot Kaspersky rescue disk 10 to scan it:
http://support.kaspersky.com/viruses/rescuedisk
0
 
LVL 24

Assisted Solution

by:aadih
aadih earned 125 total points
ID: 39776852
You could scan with Malwarebytes Antimalware to detect illegitimate key loggers.
0
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 125 total points
ID: 39777528
First be aware that there are not only software keyloggers, but also hardware keyloggers.
Then, as with any virus, I recommend to scan the computer offline. For example this is an offline scanner: http://windows.microsoft.com/en-us/windows/what-is-windows-defender-offline
0
 
LVL 23

Accepted Solution

by:
Mohammed Hamada earned 125 total points
ID: 39779310
If you have a good antivirus/Internet security application you will be able to detect probably most of the illegal keyloggers. but for those legal ones which approved by Windows you will have to search for your self which are the legal keyloggers and locate them on your Directory

c:\program files
C:\Program Files (x86)
C:\ProgramData

Some of them install an uninstall app so you can easily remove them but some don't. and you will have to manually deal with them.

something else to consider which using CMD to find out which tasks are running. you can use the below command to print the task list and filter the tasks one by one to find out which belongs to keylogger.


in CMD type
tasklist >tasks.txt

to open the file type
notepad tasks.txt
0
 

Author Comment

by:mavcom
ID: 39785148
Thank everyone. The suggestions above mostly confirm what I am already using.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question