lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <438F3839.2070606@oneiria.co.uk>
Date: Thu Dec  1 19:06:05 2005
From: david.harker at oneiria.co.uk (David Harker)
Subject: Most common keystroke loggers?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It may be easier and safer to require the user to follow onscreen
instructions for character substitution into their password than attempt
to defeat many individual bits of software. Since it's online, a munged
dynamic image could be used to supply the instructions quite easily...
just a thought.

D

Shannon Johnston wrote:
> Hi All,
> I'm looking for input on what you all believe the most common keystroke
> loggers are. I've been challenged to write an authentication method (for
> a web site) that can be secure while using a compromised system.
> 
> Thanks,
> Shannon
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDjzg5v9m3+Z4yoCYRAk5IAJ9jBdNNzoQHcv9SZyUAz4GepY4qqQCfTjGx
Z2FsjbgSsaXirw2sCj9Nd1c=
=PjH9
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ