[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <006c01c5f6cc$4cd18d10$6600a8c0@kpllaptop>
Date: Thu Dec 1 23:08:54 2005
From: lyal.collins at key2it.com.au (Lyal Collins)
Subject: Most common keystroke loggers?
"Usage once" is not an effeective measure against mitm attacks, as has been
discussed earlier in this thread.
Give user error message, while executing txn of attacker's choice on the
victim site with the legitimate user's authority.
How do disputed transactions get resovled in this supposedly more secure
framework since 'the authenticaiton is infallible' (marketing speak)?
Lyal
-----Original Message-----
From: deepquest [mailto:adf@...e511.com]
Sent: Friday, 2 December 2005 9:44 AM
To: Lyal Collins
Cc: foofus@...fus.net; 'Full-Disclosure'
Subject: Re: [Full-disclosure] Most common keystroke loggers?
> In 1996, this virtual keypad concept was broken by taking 10x10
> pixel images
> under the cursor click, showing the number/letters used in that
> password.
>
> Virtual keypads are just a minor change of tactics, not a long term
> resolution to this risk, imho.
I agree but what about the second random password and challenge
authentification? Both should be unique and usage once.
-D
Powered by blists - more mailing lists