Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Keystroke logging
From: paul dansing <dansing () swissinfo org>
Date: Thu, 30 Jun 2005 20:07:11 -0700

Thursday, June 30, 2005, 6:49:49 PM, you wrote:
- the problem is there shouldn't be any keystroke loggers in *nix,
  and if it existed, it'd be the end of the world of encryption
        as people no longer need to guess what the secret pass phrase was

Alvin, you are on crack.  There are a LOT of keystroke loggers for
unix OS and with your attitude and arrogance you are already owned and
someone is sniffing your keys.  Take the FIVE SECONDS to type "unix
keylogger" into google before yapping your trap on mailing lists.

among interesting hits:
THC-vlogger 2.1.1: http://www.thc.org/releases.php?q=keylog&x=0&y=0
lkl 0.1.0: http://sourceforge.net/projects/lkl/
 (also found at http://www.spine-group.org/toolIG.htm)
http://packetstormsecurity.org/UNIX/security/kernel.keylogger.txt
et cetera
just look around.  there are keyloggers for every os (including macos:
http://www.undergroundmac.com/files/security/keyloggers/KeyloggerX.dmg.sit

the vlogger description:
THC-vlogger, an advanced linux kernel based keylogger, enables the
capability to log keystrokes of all administrator/user's sessions via
console, serial and remote sessions (telnet, ssh), switching logging
mode by using magic password, stealthily sending logged data to
centralized remote server. Its smart mode can automatically detect
password prompts to log only sensitive user and password information.

try looking for "tty loggers" as well.
one for linux and freebsd: http://sourceforge.net/projects/ttyrpld/

-- 
Best regards,
 paul                            mailto:dansing () swissinfo org



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]