Security Basics mailing list archives
Re[2]: Invisible KeyLogger
From: Juan <jmejia () uchile cl>
Date: Wed, 28 Apr 2004 16:02:39 -0400
Hello Joshua, I would like some insight about the way it works. Up to now I know that a kernel driver is something hard to detect and by these means this logger is able to track even network logons (as it is said somewhere on their site). I am currently trying to deploy W2K Server and Active Directory. So my main concern is keeping the administration account secret. To summarize: I would like to know how to detect keyloggers in general and get some insight on kernel drivers (can limited users install them, etc.). Network security is something I understand better and feel confident to deal with ( at least, I've read the basics and know where to look for more information). Thanks. Tuesday, April 27, 2004, 1:13:27 PM, you wrote: JN> What are you looking to accomplish? JN> -----Original Message----- JN> From: Juan [mailto:jmejia () uchile cl] JN> Sent: Monday, April 26, 2004 3:02 PM JN> To: security-basics () securityfocus com JN> Subject: Invisible KeyLogger JN> Hello security-basics, JN> I have found some copies of this software "invisible keylogger" JN> (http://www.invisiblekeylogger.com) on some computers running W2K on JN> a small Lan (20 PCs) for students of the Faculty. Has someone some JN> information about the software? All I have been able to find is what JN> it says in their webpage: "Invisible Keyloger offers the most powerful JN> stealth performance. Completely undetectable to any USER..." I have JN> no experience in kernel drivers for NT whatsoever. I need some JN> guidance as a starting point. -- Best regards, Juan mailto:jmejia () uchile cl --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- Invisible KeyLogger Juan (Apr 27)
- RE: Invisible KeyLogger Joshua New (Apr 27)
- Re[2]: Invisible KeyLogger Juan (Apr 28)
- <Possible follow-ups>
- RE: Invisible KeyLogger Hagen, Eric (Apr 28)
- RE: Invisible KeyLogger Joshua New (Apr 27)