Locating Keyghost Keylogger on a Computer

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Q: Fred is a professional Ethical Hacker. One of his responsibilities includes security testing the web server of his company. His machine is using Windows Server 2003. If Fred suspects that a friend of his installed the keyghost keylogger onto his machine, which of the following solutions should he execute?


Answer is complete. Select more than one answer if applicable.


a. Use a network monitor, which will alert him when an application attempts to make an unauthorized network connection (to send the data with the typed information).

b. Use on-screen keyboards and speech-to-text conversion software that can also be useful against keyloggers, as no typing or mouse movements are involved.

c. Use commercially available anti-keyloggers such as PrivacyKeyboard.

d. Remove the SNMP agent or disable the SNMP service.

View Topics

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel