Which keylogger is described as a forged Windows device driver that records keystrokes and is undetectable by standard tools?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which keylogger is described as a forged Windows device driver that records keystrokes and is undetectable by standard tools?

Explanation:
A rootkit-based keylogger. When a keylogger is implemented as a forged Windows device driver, it operates at the kernel level as a rootkit. This lets it lie in the keyboard input path and capture keystrokes directly as they flow through the system, while hiding itself from standard security tools that don’t look deep enough into the kernel. That combination of deep access and stealth is what makes it undetectable by typical tools, which is exactly what “forged device driver” implies. Other types don’t fit this mechanism: acoustic/CAM keyloggers rely on sounds or video to guess keystrokes, not on intercepting the input path with a hidden driver; a Wi-Fi keylogger would capture keystrokes via network-related data, not by installing a Windows device driver; and an application keylogger runs in user space and is generally more easily detected.

A rootkit-based keylogger. When a keylogger is implemented as a forged Windows device driver, it operates at the kernel level as a rootkit. This lets it lie in the keyboard input path and capture keystrokes directly as they flow through the system, while hiding itself from standard security tools that don’t look deep enough into the kernel. That combination of deep access and stealth is what makes it undetectable by typical tools, which is exactly what “forged device driver” implies. Other types don’t fit this mechanism: acoustic/CAM keyloggers rely on sounds or video to guess keystrokes, not on intercepting the input path with a hidden driver; a Wi-Fi keylogger would capture keystrokes via network-related data, not by installing a Windows device driver; and an application keylogger runs in user space and is generally more easily detected.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy