Pennock's Fiero Forum
  Totally O/T - Archive
  key logger recommendations?

T H I S   I S   A N   A R C H I V E D   T O P I C
  

Email This Page to Someone! | Printable Version


key logger recommendations? by IEatRice
Started on: 09-17-2007 12:44 PM
Replies: 19
Last post by: Jake_Dragon on 09-18-2007 06:59 PM
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-17-2007 12:44 PM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post
An email list my boss and I are subscribed to (membership comes with the job, not optional) has a very heavy topic over the security of wireless networks. So, my boss wanted me to do a security audit on our network and write a report on it, ugh, grrrreeeaaaattttt.

Surprisingly it's been fun, but rather scary. It took about 30 minutes to break our WEP key (mainly because I had to learn to use aircrack) and about 10 minutes to gain administrator rights on our network (Windows 2003 server / XP machine environment), and 5 hours to brute force the 79 passwords on all of our employees logins from ms-cache hashes. My password took 4 hours itself, but my bosses who has administrator rights took 7 minutes. In fact, 52% of all passwords broke took under 10 seconds and were in the dictionary. Average password crack time was 4 minutes per password. So now I can login remotely through our VPN and do whatever I want, no need to sit in the parking lot anymore. Fun stuff, and no I wont tell you where I work.

So I'm at the point to where I need to start gathering sensitive information. So I figured I'd put a key logger on a few machines that handle a lot of sensitive data, the credit card numbers and social security numbers of our 30,000+ members. I figured I'd print off a list of whatever names, credit card numbers, and social security numbers it caught. And just for good measure I've already decided to print off a copy of our executive director's, president's, vice president's, and head attorney's pay check to make sure the threat really sinks in.

Which brings me to a key logger. Considering the information that it will be handling I don't want to use just anyone's key logger, I know they're a lot of programing folks here and it's nothing against you personally, I'm just not willing to take that security risk. And also I don't want to use a lot my money or company money to buy an expensive one. I found keylogger.org - but websites like that typically get paid to say "This one is the best..." I don't really need one with a ton of features like web surfing monitoring, network traffic, or email monitoring. I just want something that records key strokes to a *.txt so I can access it easily remotely and stays somewhat hidden.

So, any recommendations?
IP: Logged
PFF
System Bot
SonataInFSharp
Member
Posts: 882
From: Minneapolis, MN
Registered: Aug 2003


Feedback score: N/A
Leave feedback

Rate this member

Report this Post09-17-2007 12:53 PM Click Here to See the Profile for SonataInFSharpSend a Private Message to SonataInFSharpDirect Link to This Post
Why do so many people still use WEP? Is it to accommodate older hardware?

I can't believe people in this current age still use passwords found in the dictionary. My passwords never have any meaning whatsoever. I finally convinced my wife to switch all of her passwords, too.
IP: Logged
Pyrthian
Member
Posts: 29569
From: Detroit, MI
Registered: Jul 2002


Feedback score: (5)
Leave feedback





Total ratings: 342
Rate this member

Report this Post09-17-2007 01:36 PM Click Here to See the Profile for PyrthianSend a Private Message to PyrthianDirect Link to This Post
the joys of network security.
as you are now well aware - no such thing as 100% secure.
1st is to enforce secure passwords, which include numbers & such
2nd is to lock out bad logins after 2-3 tries
3rd is scripts. there are a few nifty ones, which like account lock-outs monitor login attempts, and ban an IP address based on bad login attempts.
4th is force new passwords on a regular basis
5th is login cards instead of passwords.

anyways - much is up to how secure you actually need to be. and, yes - wireless is a very unsecure. most wireless access points dont have "lockout" capability for bad login attempts.
IP: Logged
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-17-2007 01:44 PM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post
Well banning by bad login attempts are useless. The method I used is capturing a few WEP packets and brute forcing the hash on the laptop. I took this approach this it is less likely to create suspicious network traffic. I also didn't brute force the server directly, I sniffed the network for login hashes as people logged in to start their morning work. Once again, I never touched the server for it.
IP: Logged
FieroRumor
Member
Posts: 35007
From: New York
Registered: Dec 2001


Feedback score: (2)
Leave feedback





Total ratings: 348
Rate this member

Report this Post09-17-2007 01:53 PM Click Here to See the Profile for FieroRumorClick Here to visit FieroRumor's HomePageSend a Private Message to FieroRumorDirect Link to This Post
My favorite is the hardware type that fits between the keyboard and PC...looks like a tiny dongle...


IP: Logged
Marvin McInnis
Member
Posts: 11599
From: ~ Kansas City, USA
Registered: Apr 2002


Feedback score: N/A
Leave feedback





Total ratings: 227
Rate this member

Report this Post09-17-2007 02:07 PM Click Here to See the Profile for Marvin McInnisClick Here to visit Marvin McInnis's HomePageSend a Private Message to Marvin McInnisDirect Link to This Post
 
quote
Originally posted by IEatRice:

... I figured I'd put a key logger on a few machines that handle a lot of sensitive data, the credit card numbers and social security numbers of our 30,000+ members. I figured I'd print off a list of whatever names, credit card numbers, and social security numbers it caught. And just for good measure I've already decided to print off a copy of our executive director's, president's, vice president's, and head attorney's pay check to make sure the threat really sinks in.



STOP!!! until you have written authorization to do this from somebody in the organization with the power to grant that authorization. Even if your motives are good, this is the kind of activity that can possibly get you (and your boss) fired. Working through your boss, I would discuss your plans with your Corporate Counsel before going any further.

[This message has been edited by Marvin McInnis (edited 09-17-2007).]

IP: Logged
Synthesis
Member
Posts: 12207
From: Jordan, MN
Registered: Feb 2002


Feedback score:    (19)
Leave feedback





Total ratings: 294
Rate this member

Report this Post09-17-2007 02:24 PM Click Here to See the Profile for SynthesisSend a Private Message to SynthesisDirect Link to This Post
 
quote
Originally posted by Marvin McInnis:


STOP!!! until you have written authorization to do this from somebody in the organization with the power to grant that authorization. Even if your motives are good, this is the kind of activity that can possibly get you (and your boss) fired. Working through your boss, I would discuss your plans with your Corporate Counsel before going any further.



Definitely!

Just because you were asked to review the security, write a quick report and ask for permission from higher up to go that far. If you gain access to sensitive data and then flash it at them, there is going to be a kneejerk reaction that will most likely involve your loss of job.

They will most likely then hire a security firm to secure everything and then have someone else come in. I have seen it happen.
IP: Logged
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-17-2007 02:39 PM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post
 
quote
Originally posted by FieroRumor:
My favorite is the hardware type that fits between the keyboard and PC...looks like a tiny dongle...

Those are pretty cool but in order for it to work it would require an "attacker" to be inside our building, not just sitting out in the parking lot or down the street.

 
quote
Originally posted by Marvin McInnis:
STOP!!! until you have written authorization to do this from somebody in the organization with the power to grant that authorization. Even if your motives are good, this is the kind of activity that can possibly get you (and your boss) fired. Working through your boss, I would discuss your plans with your Corporate Counsel before going any further.


 
quote
Originally posted by Synthesis:
Definitely!
Just because you were asked to review the security, write a quick report and ask for permission from higher up to go that far. If you gain access to sensitive data and then flash it at them, there is going to be a kneejerk reaction that will most likely involve your loss of job.
They will most likely then hire a security firm to secure everything and then have someone else come in. I have seen it happen.


I got a PM from a forum member about this already, although I highly doubt I would be terminated over something like this, I went ahead and took his advice. I now have written permission to gain access to anything for the purpose of the audit as long as it doesn't "bring the network down" and I cannot expose the information to anyone who would be consider "unauthorized." I appreciate everyones concern though.

And my boss wasn't expecting a quick report, he is expecting a fully written, step by step of how I did it, what I used, where I got it, how long it took, and it's going to end up being several pages long, not including what I print off. He is expecting a real security audit, not an email along the lines of "ya i broke in and we are vulnerable." It's my understanding that my report is going to be given to our executive staff and board members.

So, back on topic. Suggestions?
IP: Logged
Synthesis
Member
Posts: 12207
From: Jordan, MN
Registered: Feb 2002


Feedback score:    (19)
Leave feedback





Total ratings: 294
Rate this member

Report this Post09-17-2007 02:44 PM Click Here to See the Profile for SynthesisSend a Private Message to SynthesisDirect Link to This Post
Ghost Keylogger. Will email all key presses to you in a log file, as well as the windows they were in and any dialog boxes. You may want to review them for anything that may be work inappropriate and get someone fired before you submit them.

Will your AV detect a keylogger?

IP: Logged
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-17-2007 02:46 PM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post
 
quote
Originally posted by Synthesis:
Will your AV detect a keylogger?


Don't know, but I'm testing everything on my local machine before I distribute it.
IP: Logged
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-17-2007 03:37 PM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post

IEatRice

5234 posts
Member since Oct 2004
downloaded ghost key logger, only thing I don't like about it is when the user starts up their computer it doesn't start silently, you have to hit "hide."
IP: Logged
PFF
System Bot
darkhorizon
Member
Posts: 12279
From: Flint Michigan
Registered: Jan 2006


Feedback score: (1)
Leave feedback





Total ratings: 451
Rate this member

Report this Post09-17-2007 03:47 PM Click Here to See the Profile for darkhorizonSend a Private Message to darkhorizonDirect Link to This Post
autoit

Use that program to script a launcher that will launch it off screen, and then hide it automatically.
IP: Logged
Synthesis
Member
Posts: 12207
From: Jordan, MN
Registered: Feb 2002


Feedback score:    (19)
Leave feedback





Total ratings: 294
Rate this member

Report this Post09-17-2007 04:25 PM Click Here to See the Profile for SynthesisSend a Private Message to SynthesisDirect Link to This Post
Actually, Ghost Keylogger can launch in silent mode.

It has been a few years since I used it last, but when I did use it, it could launch silently.
IP: Logged
Marvin McInnis
Member
Posts: 11599
From: ~ Kansas City, USA
Registered: Apr 2002


Feedback score: N/A
Leave feedback





Total ratings: 227
Rate this member

Report this Post09-17-2007 06:34 PM Click Here to See the Profile for Marvin McInnisClick Here to visit Marvin McInnis's HomePageSend a Private Message to Marvin McInnisDirect Link to This Post
 
quote
Originally posted by IEatRice:

... I figured I'd put a key logger on a few machines that handle a lot of sensitive data, the credit card numbers and social security numbers of our 30,000+ members.



 
quote

[I'm more concerned about] ... an "attacker" ... sitting out in the parking lot or down the street.



 
quote

I now have written permission to gain access to anything for the purpose of the audit as long as it doesn't "bring the network down" and I cannot expose the information to anyone who would be consider "unauthorized."



I don't want to beat a dead horse ... but ... You probably do now have permission to install a key logger on any computer owned by your company, but installing one (or any other software) on a computer not owned by the company, without the owner's knowledge and permission, may be a felony. I don't know Oklahoma law in this regard, but your Corporate Counsel should. Better to ask now than later.

[This message has been edited by Marvin McInnis (edited 09-17-2007).]

IP: Logged
FierociousGT
Member
Posts: 2307
From:
Registered: Jan 2007


Feedback score: (1)
Leave feedback





Total ratings: 131
Rate this member

Report this Post09-17-2007 07:08 PM Click Here to See the Profile for FierociousGTSend a Private Message to FierociousGTDirect Link to This Post
besides WEP why don't you use the MAC address?
IP: Logged
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-17-2007 07:59 PM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post
 
quote
Originally posted by Marvin McInnis:
I don't want to beat a dead horse ... but ... You probably do now have permission to install a key logger on any computer owned by your company, but installing one (or any other software) on a computer not owned by the company, without the owner's knowledge and permission, may be a felony.


I really appreciate your concern but I assure you that all of the computers I have accessed I have been given written permission and are owned by our company.

 
quote
Originally posted by FierociousGT:
besides WEP why don't you use the MAC address?


Because MAC can be spoofed just as easily as WEP can be cracked.
IP: Logged
User00013170
Member
Posts: 33617
From:
Registered: May 2006


Feedback score: N/A
Leave feedback





Total ratings: 224
User on Probation

Report this Post09-17-2007 08:06 PM Click Here to See the Profile for User00013170Send a Private Message to User00013170Direct Link to This Post
OmniQuad used to have a real nice security suite, which included a keylogger. I used to use an earlier version which also included taking screen shots if particular words or applications were launched.

I hated to do it, but it was under direction of HR to do particular 'monitoring'.
IP: Logged
IEatRice
Member
Posts: 5234
From: US
Registered: Oct 2004


Feedback score: N/A
Leave feedback





Total ratings: 119
Rate this member

Report this Post09-18-2007 09:56 AM Click Here to See the Profile for IEatRiceSend a Private Message to IEatRiceDirect Link to This Post
Ghost keylogger worked pretty well. I figured out it has a "deploy" option and doesn't even need to install. So it worked pretty well. Thanks everyone. Now I get to write a report on what we need to do to secure it!
IP: Logged
User00013170
Member
Posts: 33617
From:
Registered: May 2006


Feedback score: N/A
Leave feedback





Total ratings: 224
User on Probation

Report this Post09-18-2007 06:54 PM Click Here to See the Profile for User00013170Send a Private Message to User00013170Direct Link to This Post
 
quote
Originally posted by IEatRice:

Ghost keylogger worked pretty well. I figured out it has a "deploy" option and doesn't even need to install. So it worked pretty well. Thanks everyone. Now I get to write a report on what we need to do to secure it!



Start with a locked down domain + GPO...
IP: Logged
Jake_Dragon
Member
Posts: 33074
From: USA
Registered: Jan 2001


Feedback score: (5)
Leave feedback





Total ratings: 398
Rate this member

Report this Post09-18-2007 06:59 PM Click Here to See the Profile for Jake_DragonSend a Private Message to Jake_DragonDirect Link to This Post
When someone locks an account 3 things happen. Its written to a log, I get an e-mail and the user calls the help desk because that is the only way to unlock the account.
Virus protection is a must, something you can report on and one that will alert you.
Give the users just enough to do their job and no more.

Good luck
IP: Logged



All times are ET (US)

T H I S   I S   A N   A R C H I V E D   T O P I C
  

Contact Us | Back To Main Page

Advertizing on PFF | Fiero Parts Vendors
PFF Merchandise | Fiero Gallery
Real-Time Chat | Fiero Related Auctions on eBay



Copyright (c) 1999, C. Pennock