Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 Detecting Keylogger, Which program does that?

views
     
eXPeri3nc3
post Jan 3 2007, 11:29 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 3 2007, 06:44 AM)
I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST, shakehead.gif, Don't bother, much easier. biggrin.gif Cheers!
*
Hmm... Dunno if this is the right quote but...

QUOTE(Wikipedia.org)
TEMPEST is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentionial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled or otherwise processed by any information-processing equipment.


It seems that it's actually used by the government and now for publicity use. sweat.gif
That also means nothing is impossible in this world... laugh.gif
natakaasd
post Jan 3 2007, 04:17 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


So, Privacy is no longer private. (=.=) Bad news, isn't it? Cheers...
eXPeri3nc3
post Jan 3 2007, 05:43 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 3 2007, 04:17 PM)
So, Privacy is no longer private. (=.=) Bad news, isn't it? Cheers...
*
Ah, anyway I don't think those keyloggers will be installed on our pcs right?
It isn't that we're using credit cards or paypal accounts...
We usually forum, chat, find stuffs and etc...

I don't think that they'll keylog us to see our private "chatting" right? brows.gif

Last but not least, keylogs are nasty and irritant. Once infected very hard to remove.
scorps
post Jan 4 2007, 03:37 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 3 2007, 06:43 PM)
Last but not least, keylogs are nasty and irritant. Once infected very hard to remove.
*
are u sure about this??
how about if using anti keylogger??
i think all av can detect threat that made by key logger,
but the av must update always...
natakaasd
post Jan 4 2007, 09:47 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


(=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process...

Not every AV can remove Keyloggers. Some are practically useless. Cheers!
eXPeri3nc3
post Jan 4 2007, 10:50 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 03:37 AM)
are u sure about this??
how about if using anti keylogger??
i think all av can detect threat that made by key logger,
but the av must update always...
*
I don't personally think so.
Obviously you haven't use *undetected* keyloggers, I mean undetected.
There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file.

QUOTE(natakaasd @ Jan 4 2007, 09:47 AM)
(=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process...

Not every AV can remove Keyloggers. Some are practically useless. Cheers!
*
Wait a min, who you're disagreeing with? Just to make sure. smile.gif
scorps
post Jan 4 2007, 11:19 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 4 2007, 11:50 AM)
I don't personally think so.
Obviously you haven't use *undetected* keyloggers, I mean undetected.
There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file.
Wait a min, who you're disagreeing with? Just to make sure. smile.gif
*
thanks a lot for your info..
that news for me..
so u can give example of name key logger that can't detect by av&anti key logger??
just to know..


eXPeri3nc3
post Jan 4 2007, 11:31 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 11:19 AM)
thanks a lot for your info..
that news for me..
so u can give example of name key logger that can't detect by av&anti key logger??
just to know..
*

    To name a few:
  • Perfect keylogger pro edition - recoded and re-edited for customer
  • *underground* submissions such as elitec0ders keylogger, which is quite stealth and injects into explorer.exe

*Forgot to close tag doh.gif

This post has been edited by eXPeri3nc3: Jan 4 2007, 11:31 AM
scorps
post Jan 4 2007, 12:07 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 4 2007, 12:31 PM)
    To name a few:
  • Perfect keylogger pro edition - recoded and re-edited for customer
  • *underground* submissions such as elitec0ders keylogger, which is quite stealth and injects into explorer.exe

*Forgot to close tag doh.gif
*
have u try ardamax keylogger??
it is can detect or not?
sometimes santi psyware also can detect the key logger files and heal it???
it is true??
eXPeri3nc3
post Jan 4 2007, 01:02 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 12:07 PM)
have u try ardamax keylogger??
it is can detect or not?
sometimes santi psyware also can detect the key logger files and heal it???
it is true??
*
No, I had not tried it before.

Yes, sometimes anti spywares can remove it... seldom and rare.
natakaasd
post Jan 4 2007, 02:12 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA.

In fact, injecting into Explorer.EXE is not that hard to detect tongue.gif. Use SREng. It will show every thread in every Running Program (PID). Cheers!
scorps
post Jan 5 2007, 04:55 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



hahahha..
i know becoz i'm still newbie

user posted image

how about that picture??
comment
natakaasd
post Jan 5 2007, 07:25 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
scorps
post Jan 5 2007, 08:29 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(natakaasd @ Jan 5 2007, 08:25 AM)
The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
*
i don't get what u said above,
explain more..
please,
eXPeri3nc3
post Jan 5 2007, 11:21 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 4 2007, 02:12 PM)
Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA.

In fact, injecting into Explorer.EXE is not that hard to detect tongue.gif. Use SREng. It will show every thread in every Running Program (PID). Cheers!
*
Some can hide their PID don't forget icon_idea.gif

QUOTE(scorps @ Jan 5 2007, 04:55 AM)
hahahha..
i know becoz i'm still newbie

user posted image

how about that picture??
comment
*
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.

QUOTE(natakaasd @ Jan 5 2007, 07:25 AM)
The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
*
As the above.

QUOTE(scorps @ Jan 5 2007, 08:29 AM)
i don't get what u said above,
explain more..
please,
*
As the above.
scorps
post Jan 6 2007, 01:33 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



but sometimes key logger also good for monitoring our kids that surf internet,
we will know what they do when surf internet,
and if we see in the keylogger viewer that they go to porn sites,
then we can give them a warning.. tongue.gif
scorps
post Jan 6 2007, 10:28 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 5 2007, 12:21 PM)
Some can hide their PID don't forget icon_idea.gif
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.
*
but when i scan with avg av, it still can detect and heal it??
how to make it invisible to all av??
hhehehehe blush.gif
natakaasd
post Jan 6 2007, 01:31 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
eXPeri3nc3
post Jan 6 2007, 10:23 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 6 2007, 01:33 AM)
but sometimes  key logger also good for monitoring our kids that surf internet,
we will know what they do when surf internet,
and if we see in the keylogger viewer that they go to porn sites,
then we can give them a warning.. tongue.gif
*
Depends on how you wanna use it la... icon_idea.gif.
Monitor your gf to know what the fish she's been bitchin around icon_idea.gif laugh.gif

QUOTE(scorps @ Jan 6 2007, 10:28 AM)
but when i scan with avg av, it still can detect and heal it??
how to make it invisible to all av??
hhehehehe blush.gif
*
I know some ways... But not teaching you tongue.gif.
Those "guys" have way elite ways to do so. notworthy.gif

QUOTE(natakaasd @ Jan 6 2007, 01:31 PM)
Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
*
yeah. smile.gif
wodenus
post Jan 6 2007, 10:35 PM

Tree Octopus
********
All Stars
14,990 posts

Joined: Jan 2003
QUOTE(eXPeri3nc3 @ Jan 5 2007, 11:21 AM)
Some can hide their PID don't forget icon_idea.gif
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.
As the above.
As the above.
*
Many other ways -- filename, file size... smile.gif

3 Pages < 1 2 3 >Top
 

Change to:
| Lo-Fi Version
0.0223sec    0.55    5 queries    GZIP Disabled
Time is now: 22nd December 2025 - 09:15 AM