Can you recommend me programs that can detect key logger in my system.
Much appreciated.
And btw keylogger is the only program that can record your key strokes and steal your password right
Detecting Keylogger, Which program does that?
Detecting Keylogger, Which program does that?
|
|
Nov 19 2006, 11:49 AM, updated 20y ago
Show posts by this member only | Post
#1
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,672 posts Joined: Jan 2003 |
Can you recommend me programs that can detect key logger in my system.
Much appreciated. And btw keylogger is the only program that can record your key strokes and steal your password right |
|
|
|
|
|
Nov 19 2006, 02:17 PM
Show posts by this member only | Post
#2
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
|
|
|
Dec 11 2006, 04:55 PM
Show posts by this member only | Post
#3
|
![]() ![]()
Junior Member
200 posts Joined: Mar 2005 |
most of AV can detect key-loger. but there are some key logger that are hard to be detected. i have tried to use Norton to scan but cannot. the only way is to remove manually.
most of key logger will save all info in one file then send to an email add. so you should have internet traffic controll progeam running and detect any in/out package. of course u have to eliminate your web surfing that time. you may find some clue to remove the key logger. wish u luck, |
|
|
Dec 17 2006, 12:33 AM
Show posts by this member only | Post
#4
|
![]() ![]()
Junior Member
55 posts Joined: Dec 2004 From: Perak |
IMO , keylogger is classified as spyware programs , if you use spydefense or AVG anti-spyware should be able to remove all
|
|
|
Dec 18 2006, 04:32 PM
Show posts by this member only | Post
#5
|
![]() ![]() ![]() ![]() ![]()
Senior Member
992 posts Joined: Aug 2006 From: Bolehland |
You can try Spy Sweeper. It is a bit expensive but it is highly rated
|
|
|
Dec 19 2006, 10:00 PM
Show posts by this member only | Post
#6
|
![]() ![]()
Junior Member
55 posts Joined: Dec 2004 From: Perak |
highly rated , yeah , maybe a cocktail of softwares will do
1. Spybot 2. Arovax Anti-Spyware 3. AVG Anti-Spyware 4. SpySweeper 5. Hijackthis with tutorials and manuals |
|
|
|
|
|
Dec 19 2006, 11:35 PM
Show posts by this member only | Post
#7
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Dec 21 2006, 10:16 PM
Show posts by this member only | Post
#8
|
![]() ![]()
Junior Member
55 posts Joined: Dec 2004 From: Perak |
yeah , but one is usually not enough , because of the signatures
|
|
|
Dec 21 2006, 10:34 PM
Show posts by this member only | Post
#9
|
![]() ![]() ![]()
Junior Member
434 posts Joined: Mar 2005 From: Subang Jaya |
Question!
Zone Alarm detected a keylogger- Driver\SynTP at system32\drivers. Does it spell trouble? |
|
|
Dec 22 2006, 07:33 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
If ZA detects it, YES. Quite a number of Malware hide in the system32\drivers folder in Win XP. If possible, do the following:-
1. HijackThis Log 2. Kaspersky / TrendMicro Online Scanner Log 3. System Repair Engineer Log Post a topic at Technical Support (I believe you know that, right, CrazyNut?). Cheers! |
|
|
Dec 22 2006, 01:48 PM
|
![]() ![]() ![]()
Junior Member
434 posts Joined: Mar 2005 From: Subang Jaya |
Hi natakaasd, thanks for the reply.
Aww, and it was on my brand new Dell 6400 as well..I made sure I have my firewall on before I surfed the net..anyhow, will do the scans and post in Tech Support. Thanks once again! |
|
|
Dec 23 2006, 01:54 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
QUOTE(CrazyNut @ Dec 21 2006, 11:34 PM) there is so many keylogger on the website,but very hard to find the free one.. always need for registration, but i'm very worry about keylogger in the cybercafe(cc) do you think that many cc owner's install this program and steal our password email, and all information when we using their cc??? how to prevent this?? suggestion needed... |
|
|
Dec 25 2006, 12:44 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
Prevention? Use Virtual Keyboards... No doubt, quite a number of SMART Keyloggers can trace down to everything. They Print Screen, Trace Vitual Keyboards and everything. I guess for safety sake, Don't Use the computer at all. Hide in the mountains. LOL. Joking only. Cheers!
|
|
|
|
|
|
Dec 25 2006, 12:53 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,884 posts Joined: Sep 2006 From: Mummy |
There are hardware keyloggers too, but I don't think we want to get into that
|
|
|
Dec 25 2006, 01:10 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
Hardware Keyloggers? Oh bother. Don't use a keyboard.
|
|
|
Jan 2 2007, 03:11 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 2 2007, 03:18 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
|
|
|
Jan 2 2007, 03:21 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 2 2007, 08:07 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
Hmm just a doubt, can hardware keyloggers capture wireless keyboard inputs?
|
|
|
Jan 3 2007, 06:44 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST,
This post has been edited by natakaasd: Jan 3 2007, 06:44 AM |
|
|
Jan 3 2007, 11:29 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(natakaasd @ Jan 3 2007, 06:44 AM) I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST, Hmm... Dunno if this is the right quote but...QUOTE(Wikipedia.org) TEMPEST is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentionial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled or otherwise processed by any information-processing equipment. It seems that it's actually used by the government and now for publicity use. That also means nothing is impossible in this world... |
|
|
Jan 3 2007, 04:17 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
So, Privacy is no longer private. (=.=) Bad news, isn't it? Cheers...
|
|
|
Jan 3 2007, 05:43 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(natakaasd @ Jan 3 2007, 04:17 PM) Ah, anyway I don't think those keyloggers will be installed on our pcs right? It isn't that we're using credit cards or paypal accounts... We usually forum, chat, find stuffs and etc... I don't think that they'll keylog us to see our private "chatting" right? Last but not least, keylogs are nasty and irritant. Once infected very hard to remove. |
|
|
Jan 4 2007, 03:37 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 4 2007, 09:47 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
(=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process...
Not every AV can remove Keyloggers. Some are practically useless. Cheers! |
|
|
Jan 4 2007, 10:50 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(scorps @ Jan 4 2007, 03:37 AM) are u sure about this?? I don't personally think so.how about if using anti keylogger?? i think all av can detect threat that made by key logger, but the av must update always... Obviously you haven't use *undetected* keyloggers, I mean undetected. There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file. QUOTE(natakaasd @ Jan 4 2007, 09:47 AM) (=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process... Wait a min, who you're disagreeing with? Just to make sure. Not every AV can remove Keyloggers. Some are practically useless. Cheers! |
|
|
Jan 4 2007, 11:19 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
QUOTE(eXPeri3nc3 @ Jan 4 2007, 11:50 AM) I don't personally think so. thanks a lot for your info..Obviously you haven't use *undetected* keyloggers, I mean undetected. There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file. Wait a min, who you're disagreeing with? Just to make sure. that news for me.. so u can give example of name key logger that can't detect by av&anti key logger?? just to know.. |
|
|
Jan 4 2007, 11:31 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(scorps @ Jan 4 2007, 11:19 AM) thanks a lot for your info.. that news for me.. so u can give example of name key logger that can't detect by av&anti key logger?? just to know..
*Forgot to close tag This post has been edited by eXPeri3nc3: Jan 4 2007, 11:31 AM |
|
|
Jan 4 2007, 12:07 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
QUOTE(eXPeri3nc3 @ Jan 4 2007, 12:31 PM)
*Forgot to close tag it is can detect or not? sometimes santi psyware also can detect the key logger files and heal it??? it is true?? |
|
|
Jan 4 2007, 01:02 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
|
|
|
Jan 4 2007, 02:12 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA.
In fact, injecting into Explorer.EXE is not that hard to detect |
|
|
Jan 5 2007, 04:55 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 5 2007, 07:25 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself.
The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers! |
|
|
Jan 5 2007, 08:29 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
QUOTE(natakaasd @ Jan 5 2007, 08:25 AM) The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. i don't get what u said above,The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers! explain more.. please, |
|
|
Jan 5 2007, 11:21 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(natakaasd @ Jan 4 2007, 02:12 PM) Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA. Some can hide their PID don't forget In fact, injecting into Explorer.EXE is not that hard to detect QUOTE(scorps @ Jan 5 2007, 04:55 AM) Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.QUOTE(natakaasd @ Jan 5 2007, 07:25 AM) The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. As the above.The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers! QUOTE(scorps @ Jan 5 2007, 08:29 AM) As the above. |
|
|
Jan 6 2007, 01:33 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
but sometimes key logger also good for monitoring our kids that surf internet,
we will know what they do when surf internet, and if we see in the keylogger viewer that they go to porn sites, then we can give them a warning.. |
|
|
Jan 6 2007, 10:28 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 6 2007, 01:31 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
|
|
|
Jan 6 2007, 10:23 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(scorps @ Jan 6 2007, 01:33 AM) but sometimes key logger also good for monitoring our kids that surf internet, Depends on how you wanna use it la... we will know what they do when surf internet, and if we see in the keylogger viewer that they go to porn sites, then we can give them a warning.. Monitor your gf to know what the fish she's been bitchin around QUOTE(scorps @ Jan 6 2007, 10:28 AM) but when i scan with avg av, it still can detect and heal it?? I know some ways... But not teaching you how to make it invisible to all av?? hhehehehe Those "guys" have way elite ways to do so. QUOTE(natakaasd @ Jan 6 2007, 01:31 PM) Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers! yeah. |
|
|
Jan 6 2007, 10:35 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
All Stars
14,990 posts Joined: Jan 2003 |
|
|
|
Jan 6 2007, 10:43 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
|
|
|
Jan 6 2007, 11:40 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
QUOTE(natakaasd @ Jan 6 2007, 02:31 PM) Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers! do you say i need to change my av??right?? bro what is PID,api?? |
|
|
Jan 7 2007, 05:42 AM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,122 posts Joined: Jan 2003 |
its kinda dangerous these...i know bcoz i used once on some pc in labs and managed to get some ppls friendster accounts. i did a few things, but that was me few years ago...-nothing major done.
now even thinking of keyloggers make me paranoid. i use on screen keyboard to fill in login info on bank sites. is that safe? |
|
|
Jan 7 2007, 07:48 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 7 2007, 12:28 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(scorps @ Jan 6 2007, 11:40 PM) DUDE, google!API Definition from Google QUOTE Application Programming Interface. The interface (calling conventions) by which an application program accesses operating system and other services. An API is defined at source code level and provides a level of abstraction between the application and the kernel (or other privileged utilities) to ensure the portability of the code. PID Definition from Google QUOTE Process Identifier; each process has a unique PID assigned by the operating system QUOTE(scorps @ Jan 7 2007, 07:48 AM) This looks awfully familiar, not very sure tho'...Is it PKL? |
|
|
Jan 7 2007, 02:49 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
QUOTE(eXPeri3nc3 @ Jan 7 2007, 01:28 PM) not,i can't tell to you that name ... sori bro... but i think u can find it by yourself in the internet and here also something i want to share, ![]() very interesting,but i don't try this settings yet, ![]() but i think maybe the firewall can deny this setting and also the av inside the computer This post has been edited by scorps: Jan 7 2007, 02:51 PM |
|
|
Jan 7 2007, 09:00 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(scorps @ Jan 7 2007, 02:49 PM) not, Oh yeahz, btw, if there's a GUI for a kl... means... it sucks... lol i can't tell to you that name ... sori bro... but i think u can find it by yourself in the internet and here also something i want to share, ![]() very interesting,but i don't try this settings yet, ![]() but i think maybe the firewall can deny this setting and also the av inside the computer Hard coded with command lines only is hard to detect... |
|
|
Jan 8 2007, 08:52 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL.
Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers! |
|
|
Jan 8 2007, 09:50 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
All Stars
19,324 posts Joined: Jan 2003 |
QUOTE(natakaasd @ Jan 8 2007, 08:52 AM) In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL. then how can u differenciate them?Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers! |
|
|
Jan 8 2007, 09:54 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
Don't differentiate between them. Just don't use them. unless of GREAT necessity. LOL. Cheers!
|
|
|
Jan 8 2007, 10:13 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 8 2007, 02:28 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(natakaasd @ Jan 8 2007, 08:52 AM) In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL. Lol, came across a few. Lol. Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers! QUOTE(natakaasd @ Jan 8 2007, 09:54 AM) Agree QUOTE(scorps @ Jan 8 2007, 10:13 AM) If you don't know what you're doing, you're actually playing with fire. |
|
|
Jan 12 2007, 12:37 PM
|
![]() ![]() ![]()
Junior Member
455 posts Joined: Oct 2006 |
does formatting the HDD can remove keylogger?
|
|
|
Jan 12 2007, 12:52 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,572 posts Joined: Jun 2005 From: Terengganu Darul Iman |
|
|
|
Jan 12 2007, 04:40 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(scorps @ Jan 12 2007, 12:52 PM) i think yes, Agree, and that's why you need to run a full system scan with your AV's to determine that it's clean. but u need to confirm if the .exe file still can activate itself after u format, and maybe .exe files in another partition, so u need t clean all files in your hdd disk by scanning witha antikeylogge.. |
| Change to: | 0.0266sec
0.59
5 queries
GZIP Disabled
Time is now: 22nd December 2025 - 02:25 AM |