Page 1 of 2 12 LastLast
Results 1 to 10 of 17

Thread: Key Loggers in Stealth Mode

  1. #1
    Junior Member
    Join Date
    Mar 2005
    Posts
    1

    Key Loggers in Stealth Mode

    Hi all,

    How to identify keyloggers running in stealth mode.

    Thanx.

  2. #2
    Senior Member t34b4g5's Avatar
    Join Date
    Sep 2003
    Location
    Australia.
    Posts
    2,391
    Greetings and welcome to AntiOnline.Com.

    Just wondering if you could update your 1st post and maybe input some more information.

    as your post reads very vague.

  3. #3
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Yes,

    I would have thought that all keyloggers run in "stealth mode" apart from the ones that you use to make training material with.

    What type of keylogger?

    1. Local access or remote access?
    2. Physical or software keylogger?

    Also are you talking about local detection or over a network?

  4. #4
    Macht Nicht Aus moxnix's Avatar
    Join Date
    May 2002
    Location
    Huson Mt.
    Posts
    1,752
    And do you have a suspicion that some one might be trying to monitor you?
    \"Life should NOT be a journey to the grave with the intention of arriving safely in an attractive and well preserved body, but rather to skid in sideways, Champagne in one hand - strawberries in the other, body thoroughly used up, totally worn out and screaming WOO HOO - What a Ride!\"
    Author Unknown

  5. #5
    Junior Member
    Join Date
    Nov 2008
    Posts
    7

    Key loggers

    I also using key loggers.... can any body give to me some remote key loggers with crack .....that key logger capable with windows vista.........plz hackers give me some details . waiting for you

  6. #6
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Hmmm,

    [QUOTE]can any body give to me some remote key loggers with crack /QUOTE]

    No, we don't do that.............proprietary software is covered by copyright.

    Try this: http://letmegooglethatforyou.com/

  7. #7
    There are many ways to detect a key logger.. Although the possibility to detect every all the key logger's out there is not possible (hardware / software based).

    You can install a decent anti-virus (original, paid for and not cracked) which will detect many key loggers out there.. (One free app that does it is spybot : http://www.spybot.info/en/download/index.html)

    You can use an application that gives "proactive protection / defense" where the behavior of a file hooking onto keystrokes can help you detect key loggers.

    I wouldn’t advise googling this since there are "million" fake products out there..


    Get spybot, scan your machine online at

    safety.live.com
    housecall.trendmicro.com

    If you find something let us know.

    As for hardware based key loggers you can check the wire from the keyboard to the CPU and ensure nothing is intercepting it at any endpoints or in the middle.

    / As for the elite haxxador who thought we would give him a "cracked" version of key logger which will work on vista.. I pity you since I am sure you're machine is owned in one way or the other .. / Ignorant fool.
    Last edited by ByTeWrangler; December 2nd, 2008 at 06:02 PM.
    Parth Maniar,
    CISSP, CISM, CISA, SSCP

    *Thank you GOD*

    Greater the Difficulty, SWEETER the Victory.

    Believe in yourself.

  8. #8
    And shouldn't ragul be banned ?
    Parth Maniar,
    CISSP, CISM, CISA, SSCP

    *Thank you GOD*

    Greater the Difficulty, SWEETER the Victory.

    Believe in yourself.

  9. #9
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Hi there ByTe~,

    We really need to know a bit more about the original posters environment, or theoretical scenario (given that we have a number of student members). Otherwise it is rather a big topic, and I guess that I would need at least 3,000 words plus some pictures and diagrams to even make a half decent attempt.

    Obviously not what is suitable for a forum such as ours?

    As for ragul................

    Well it is obvious that English is not his first language, and intellect is not his long suit in a game of bridge? after all, why the hell should anyone risk financial loss, and even prison, for someone you do not even know, and for no financial gain?

    It would appear that his country currently has no laws regarding copyright infringement and theft of intellectual property..............or maybe he works for the RIAA?

    Please look down the left hand side of a post.............at the bottom are the scales of justice............ as a member you can express your own feelings regarding a post

  10. #10
    Banned
    Join Date
    Jan 2008
    Posts
    605
    Just setup a permanent ban for anyone who posts the H-word.

Similar Threads

  1. NMAP Scanning and PortSentry Evasion
    By Striek in forum The Security Tutorials Forum
    Replies: 10
    Last Post: January 17th, 2006, 04:07 AM
  2. A look into IDS/Snort Whole thing by QoD
    By qod in forum The Security Tutorials Forum
    Replies: 6
    Last Post: February 27th, 2004, 03:03 AM
  3. A look into IDS/Snort part 2 of 3 by QoD
    By qod in forum The Security Tutorials Forum
    Replies: 3
    Last Post: January 25th, 2004, 11:47 PM
  4. How well protected are you?
    By valhallen in forum Web Security
    Replies: 39
    Last Post: January 2nd, 2004, 03:27 AM
  5. freeBSD
    By skilar in forum Hardware
    Replies: 21
    Last Post: August 6th, 2003, 08:32 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •