Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 Detecting Keylogger, Which program does that?

views
     
eXPeri3nc3
post Nov 19 2006, 02:17 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(ExCrIpT @ Nov 19 2006, 12:49 PM)
Can you recommend me programs that can detect key logger in my system.
Much appreciated.

And btw keylogger is the only program that can record your key strokes and steal your password right
*
Antivirus will detect keyloggers. smile.gif
Are you using any AV's currently?
eXPeri3nc3
post Jan 2 2007, 03:18 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 2 2007, 03:11 PM)
khkhokohkohkho..
without keyboard, how the comp will be turn on??
*
you need to use keyboard to turn on the pc meh?
unless you need password to access the pc.

Or maybe you need to type when you do your work... icon_idea.gif

Windows On-Screen Keyboard... Lol! xD
eXPeri3nc3
post Jan 2 2007, 08:07 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



Hmm just a doubt, can hardware keyloggers capture wireless keyboard inputs? icon_idea.gif since it's not parallel ports.
eXPeri3nc3
post Jan 3 2007, 11:29 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 3 2007, 06:44 AM)
I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST, shakehead.gif, Don't bother, much easier. biggrin.gif Cheers!
*
Hmm... Dunno if this is the right quote but...

QUOTE(Wikipedia.org)
TEMPEST is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentionial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled or otherwise processed by any information-processing equipment.


It seems that it's actually used by the government and now for publicity use. sweat.gif
That also means nothing is impossible in this world... laugh.gif
eXPeri3nc3
post Jan 3 2007, 05:43 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 3 2007, 04:17 PM)
So, Privacy is no longer private. (=.=) Bad news, isn't it? Cheers...
*
Ah, anyway I don't think those keyloggers will be installed on our pcs right?
It isn't that we're using credit cards or paypal accounts...
We usually forum, chat, find stuffs and etc...

I don't think that they'll keylog us to see our private "chatting" right? brows.gif

Last but not least, keylogs are nasty and irritant. Once infected very hard to remove.
eXPeri3nc3
post Jan 4 2007, 10:50 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 03:37 AM)
are u sure about this??
how about if using anti keylogger??
i think all av can detect threat that made by key logger,
but the av must update always...
*
I don't personally think so.
Obviously you haven't use *undetected* keyloggers, I mean undetected.
There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file.

QUOTE(natakaasd @ Jan 4 2007, 09:47 AM)
(=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process...

Not every AV can remove Keyloggers. Some are practically useless. Cheers!
*
Wait a min, who you're disagreeing with? Just to make sure. smile.gif
eXPeri3nc3
post Jan 4 2007, 11:31 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 11:19 AM)
thanks a lot for your info..
that news for me..
so u can give example of name key logger that can't detect by av&anti key logger??
just to know..
*

    To name a few:
  • Perfect keylogger pro edition - recoded and re-edited for customer
  • *underground* submissions such as elitec0ders keylogger, which is quite stealth and injects into explorer.exe

*Forgot to close tag doh.gif

This post has been edited by eXPeri3nc3: Jan 4 2007, 11:31 AM
eXPeri3nc3
post Jan 4 2007, 01:02 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 12:07 PM)
have u try ardamax keylogger??
it is can detect or not?
sometimes santi psyware also can detect the key logger files and heal it???
it is true??
*
No, I had not tried it before.

Yes, sometimes anti spywares can remove it... seldom and rare.
eXPeri3nc3
post Jan 5 2007, 11:21 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 4 2007, 02:12 PM)
Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA.

In fact, injecting into Explorer.EXE is not that hard to detect tongue.gif. Use SREng. It will show every thread in every Running Program (PID). Cheers!
*
Some can hide their PID don't forget icon_idea.gif

QUOTE(scorps @ Jan 5 2007, 04:55 AM)
hahahha..
i know becoz i'm still newbie

user posted image

how about that picture??
comment
*
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.

QUOTE(natakaasd @ Jan 5 2007, 07:25 AM)
The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
*
As the above.

QUOTE(scorps @ Jan 5 2007, 08:29 AM)
i don't get what u said above,
explain more..
please,
*
As the above.
eXPeri3nc3
post Jan 6 2007, 10:23 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 6 2007, 01:33 AM)
but sometimes  key logger also good for monitoring our kids that surf internet,
we will know what they do when surf internet,
and if we see in the keylogger viewer that they go to porn sites,
then we can give them a warning.. tongue.gif
*
Depends on how you wanna use it la... icon_idea.gif.
Monitor your gf to know what the fish she's been bitchin around icon_idea.gif laugh.gif

QUOTE(scorps @ Jan 6 2007, 10:28 AM)
but when i scan with avg av, it still can detect and heal it??
how to make it invisible to all av??
hhehehehe blush.gif
*
I know some ways... But not teaching you tongue.gif.
Those "guys" have way elite ways to do so. notworthy.gif

QUOTE(natakaasd @ Jan 6 2007, 01:31 PM)
Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
*
yeah. smile.gif
eXPeri3nc3
post Jan 6 2007, 10:43 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(wodenus @ Jan 6 2007, 10:35 PM)
Many other ways -- filename, file size... smile.gif
*
yeah, but some AV's still can detect it...
They modify the headers... API's... Loops... rclxub.gif
eXPeri3nc3
post Jan 7 2007, 12:28 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 6 2007, 11:40 PM)
do you say i need to change my av??
right??

bro what is PID,api??
*
DUDE, google!

API Definition from Google
QUOTE
Application Programming Interface. The interface (calling conventions) by which an application program accesses operating system and other services. An API is defined at source code level and provides a level of abstraction between the application and the kernel (or other privileged utilities) to ensure the portability of the code.


PID Definition from Google
QUOTE
Process Identifier; each process has a unique PID assigned by the operating system


QUOTE(scorps @ Jan 7 2007, 07:48 AM)
user posted image
and how about this?? tongue.gif

i not try this yet,
who have try this before,can share the experience??
*
This looks awfully familiar, not very sure tho'...
Is it PKL?
eXPeri3nc3
post Jan 7 2007, 09:00 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 7 2007, 02:49 PM)
not,
i can't tell to you that name ...
sori bro...
but i think u can find it by yourself in the internet

and here also something i want to share,

user posted image
very interesting,but i don't try this settings yet,
user posted image

but i think maybe the firewall can deny this setting and also the av inside the computer
*
Oh yeahz, btw, if there's a GUI for a kl... means... it sucks... lol laugh.gif
Hard coded with command lines only is hard to detect... thumbup.gif
eXPeri3nc3
post Jan 8 2007, 02:28 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 8 2007, 08:52 AM)
In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL.

Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers!
*
Lol, came across a few. Lol. laugh.gif

QUOTE(natakaasd @ Jan 8 2007, 09:54 AM)
Don't differentiate between them. Just don't use them. unless of GREAT necessity. LOL. Cheers!
*
Agree icon_rolleyes.gif I use it just to test on how keylogger works and I keylogged my own pc as I'm away from my house that time. My friends really did some stuffs to mah pc and later I flame them back like hell whistling.gif

QUOTE(scorps @ Jan 8 2007, 10:13 AM)
hehehhehe..
this quite dangerous thing...
*
If you don't know what you're doing, you're actually playing with fire.
eXPeri3nc3
post Jan 12 2007, 04:40 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 12 2007, 12:52 PM)
i think yes,
but u need to confirm if the .exe file still can activate itself after u format,
and maybe .exe files in another partition,
so u need t clean all files in your hdd disk by scanning witha antikeylogge..
*
Agree, and that's why you need to run a full system scan with your AV's to determine that it's clean. wink.gif

 

Change to:
| Lo-Fi Version
0.0219sec    0.87    6 queries    GZIP Disabled
Time is now: 22nd December 2025 - 03:55 PM