[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <43904CCC.13101.2CC78620@gmail.com>
Date: Fri Dec 2 00:32:09 2005
From: nick at virus-l.demon.co.uk (Nick FitzGerald)
Subject: Most common keystroke loggers?
mz4ph0d@...il.com to Lyal Collins:
> >In 1996, this virtual keypad concept was broken by taking 10x10 pixel images
> >under the cursor click, showing the number/letters used in that password.
> >
> >Virtual keypads are just a minor change of tactics, not a long term
> >resolution to this risk, imho.
>
> While it's obviously NOT the most secure way, that absolutely
> nothing can be considered secure if the system is compromised,
> that it would depend on either depending on either Javascript
> being enabled on the client-side or using Java (or perhaps
> Flash) for the interface elements, and using a random system
> to interpret the results (because the interaction with the server
> over the network can also likely be parsed), etc, etc ...
>
> What about a system that used a randomly built and placed
> keyboard ...
What's with this obsession with annoying the user with random
placement?
And _much_ worse, random key layout?
Neither buy you anything, nor does the combination, so stop suggesting
them already.
> ... where the button (or more effectively the entire
> keyboard, though less usable obviously) went blank on
> mouseover and click?
Absolutely trivially broken. As most key loggers already monitor the
web page (or the domain of the web page) all they need do is add a
"grab a screen shot when the randomized keypad window pops open from
<URL>" and maybe a "grab the top-left window location of that window"
then all the "keylogger" needes to do is record the positions of mouse
clicks.
Broken. Perhaps twenty minutes coding...
And don't get me started on the usability issues -- it would be
entirely useless for most fine-motor or visually impaired users who
would be able to use a normal (onscreen) keyboard...
> That would at least stop two of those problems, those being
> basic keylogging, and screenshots of the hotspot on click.
Yet it entirely fails to solve the problem of recording the keys that
the user "presses", "types" or however you prefer to express it. The
_point_ is not to prevent keylogging _pre se_ but to prevent stealing
the _information_ conveyed in the "keying". Your suggested scheme is
precisely useless for solving that problem.
> At least then if a system like this is the only one that is
> deemed doable it would be more secure than one that
> didn't have those features. Yes? It may as well be on the
> higher end of insecure than the lower end, (if "insecure" can
> be seen as a scale, as unfortunately it often has to be in the
> real world with budgets and stupid management).
This is just as insecure as a plain onscreen keyboard, and with less
usability. Sounds like a bargain at any price -- NOT!
You are deeply confused if you think "is totally trivial and hasn't
been attacked _yet_" is in any meaningful way "more secure" than "is
equally trivial and has already been broken".
> Z.
Yes, go back to sleep...
Regards,
Nick FitzGerald
Powered by blists - more mailing lists