Security Basics mailing list archives
Re[2]: Invisible KeyLogger
From: Juan <jmejia () uchile cl>
Date: Wed, 28 Apr 2004 16:02:39 -0400
Hello Joshua,
I would like some insight about the way it works. Up to now I
know that a kernel driver is something hard to detect and by
these means this logger is able to track even network logons (as
it is said somewhere on their site). I am currently trying to
deploy W2K Server and Active Directory. So my main concern is
keeping the administration account secret.
To summarize: I would like to know how to detect keyloggers in
general and get some insight on kernel drivers (can limited
users install them, etc.).
Network security is something I understand better and feel
confident to deal with ( at least, I've read the basics and know
where to look for more information).
Thanks.
Tuesday, April 27, 2004, 1:13:27 PM, you wrote:
JN> What are you looking to accomplish?
JN> -----Original Message-----
JN> From: Juan [mailto:jmejia () uchile cl]
JN> Sent: Monday, April 26, 2004 3:02 PM
JN> To: security-basics () securityfocus com
JN> Subject: Invisible KeyLogger
JN> Hello security-basics,
JN> I have found some copies of this software "invisible keylogger"
JN> (http://www.invisiblekeylogger.com) on some computers running W2K on
JN> a small Lan (20 PCs) for students of the Faculty. Has someone some
JN> information about the software? All I have been able to find is what
JN> it says in their webpage: "Invisible Keyloger offers the most powerful
JN> stealth performance. Completely undetectable to any USER..." I have
JN> no experience in kernel drivers for NT whatsoever. I need some
JN> guidance as a starting point.
--
Best regards,
Juan mailto:jmejia () uchile cl
---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------
Current thread:
- Invisible KeyLogger Juan (Apr 27)
- RE: Invisible KeyLogger Joshua New (Apr 27)
- Re[2]: Invisible KeyLogger Juan (Apr 28)
- <Possible follow-ups>
- RE: Invisible KeyLogger Hagen, Eric (Apr 28)
- RE: Invisible KeyLogger Joshua New (Apr 27)
