•
A regular hardware keylogger is used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer
keyboard and the computer. It logs all keyboard activity to its internal memory which can be accessed by typing in a series of pre-defined characters. A hardware keylogger has an advantage over a software solution; because it is not dependent on the computer's operating system it will not interfere with any program running on the target machine and hence cannot be detected by any software. They are typically designed to have an innocuous appearance that blends in with the rest of the cabling or hardware, such as appearing to be an
EMC Balun. They can also be installed inside a keyboard itself (as a circuit attachment or modification), or the keyboard could be manufactured with this "feature". They are designed to work with legacy
PS/2 keyboards, or more recently, with
USB keyboards. Some variants, known as wireless hardware keyloggers, have the ability to be controlled and monitored remotely by means of a wireless communication standard. •
Wireless keylogger sniffers - Collect packets of data being transferred from a wireless keyboard and its receiver and then attempt to crack the encryption key being used to secure wireless communications between the two devices. •
Firmware - A computer's
BIOS, which is typically responsible for handling keyboard events, can be reprogrammed so that it records keystrokes as it processes them. •
Keyboard overlays - a fake keypad is placed over the real one so that any keys pressed are registered by both the eavesdropping device as well as the legitimate one that the customer is using. •
Key commands - exist in much legitimate software. These programs require keyloggers to know when you’re using a specific command. ==Countermeasures==