[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <001101c5f6d5$9fda54c0$6600a8c0@kpllaptop>
Date: Fri Dec 2 00:15:34 2005
From: lyal.collins at key2it.com.au (Lyal Collins)
Subject: Most common keystroke loggers?
Just expand the size of the image captured under the hotspot to include
surrounding buttons.
If the image shows the values "around" the button clicked, it makes it
possible (but less trivial) to infer the value clicked.
<humour on> Having a totally blank on-screen keypad might work - let the
users guess their own passwords!!! <humour off>
Lyal
-----Original Message-----
From: full-disclosure-bounces@...ts.grok.org.uk
[mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of
mz4ph0d@...il.com
Sent: Friday, 2 December 2005 10:18 AM
To: full-disclosure@...ts.grok.org.uk
Subject: re: [Full-disclosure] Most common keystroke loggers?
At 9:41 AM +1100 2/12/05, Lyal Collins wrote:
>In 1996, this virtual keypad concept was broken by taking 10x10 pixel
>images under the cursor click, showing the number/letters used in that
>password.
>
>Virtual keypads are just a minor change of tactics, not a long term
>resolution to this risk, imho.
[snip]
What about a system that used a randomly built and placed keyboard where the
button (or more effectively the entire keyboard, though less usable
obviously) went blank on mouseover and click?
That would at least stop two of those problems, those being basic
keylogging, and screenshots of the hotspot on click. At least then if a
system like this is the only one that is deemed doable it would be more
secure than one that didn't have those features. Yes? It may as well be on
the higher end of insecure than the lower end, (if "insecure" can be seen as
a scale, as unfortunately it often has to be in the real world with budgets
and stupid management).
Z.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists