Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Networking & Security
  • Search

Way around key loggers?

Having problems getting connected to the internet or running a server? Wondering about securing your box? Ask here.
Post Reply
Advanced search
11 posts • Page 1 of 1
Author
Message
bobwhoops
n00b
n00b
Posts: 56
Joined: Sun Jan 09, 2005 10:12 pm

Way around key loggers?

  • Quote

Post by bobwhoops » Thu Jun 08, 2006 11:36 pm

I've got a summer job as an intern, and my company has key loggers on all the machines. I want to ssh to my machine, but I'm afraid of them stealing my password and performing man in the middle attacks, or just looking at what I'm typing.

Are there ways to get around this? I know that on-screen keyboards don't work. What about copying and pasting text? I'm not sure if it works in Windows, but once I'm connected, I could do something like open up a text file with all of the letters and symbols I could need, and then use screen's copy and paste feature to copy and paste letters. Slow, I guess, but it works... There's no way they could pick that up.

What about logging in though? Should I put my key on a usb drive or something and authenticate using that?
Top
wellwhoopdedooo
n00b
n00b
Posts: 69
Joined: Fri Mar 04, 2005 6:06 pm

  • Quote

Post by wellwhoopdedooo » Thu Jun 08, 2006 11:48 pm

Don't even try to get around them. Don't ssh to home at work, don't log into your e-mail, don't pay your bills, nothing. You'll forget and type your password in, or you'll think you're getting around it but you won't be.

Not to mention, it'd be trivially easy to capture any data from a USB drive, so your key's not safe either.

Even copy/paste can be captured by keyloggers. There's no way anyone here can answer your question, you'd have to ask the people at your internship. If someone offers a way to get around it, don't trust it. Unless they're the person that wrote the keylogger, there's just no way to know.
Top
bobwhoops
n00b
n00b
Posts: 56
Joined: Sun Jan 09, 2005 10:12 pm

  • Quote

Post by bobwhoops » Fri Jun 09, 2006 12:07 am

Yeah, I didn't think copy and paste would work from Windows, but it would if I did it from screen inside my box.

I guess you're right about the usb drive though.

Still, it's unlikely they would do that, I think.
Top
yabbadabbadont
Advocate
Advocate
User avatar
Posts: 4791
Joined: Fri Mar 14, 2003 12:02 am
Location: 2 exits past crazy

  • Quote

Post by yabbadabbadont » Fri Jun 09, 2006 12:13 am

You say you are an intern at this company. Doing, or attempting to do, anything to circumvent their established security procedures would most likely get you fired. At the very least, they wouldn't consider you for a permanent placement later, nor would they give you a good recommendation. Also, if you are worried about this company behaving in an (in the US at least) illegal manner, why are you there anyway. Further, especially since you are an intern, you should not be doing anything on the companie's computers that isn't directly related to your job.
Bones McCracker wrote:On the other hand, regex is popular with the ladies.
Top
guero61
l33t
l33t
Posts: 811
Joined: Mon Oct 14, 2002 2:22 am
Location: Behind you

  • Quote

Post by guero61 » Fri Jun 09, 2006 12:14 am

Don't forget they're paying you to work on *their* stuff - not yours. Since I work in a research position, I have a few more liberties, but even then I make special effort to split my personal and professional browsing/administration activities.

If I were you, I would assume everything you do at work as compromised by your employer - if they're key-logging, it is. The moment they find an anomaly with what you're doing, you're gone - most companies won't even mess around with figuring out what you were doing before they walk you out of the door. Then they'll go back and see if there's anything worth prosecuting you over.
Top
bobwhoops
n00b
n00b
Posts: 56
Joined: Sun Jan 09, 2005 10:12 pm

  • Quote

Post by bobwhoops » Fri Jun 09, 2006 1:43 am

Ok--how about this?

I type my password in a span of like twenty minutes.

Type a letter, go edit a document, go back, add another...

Is that safe?
Top
guero61
l33t
l33t
Posts: 811
Joined: Mon Oct 14, 2002 2:22 am
Location: Behind you

  • Quote

Post by guero61 » Fri Jun 09, 2006 2:24 am

Nope. If they're using a software key logger, it's trivial for a human to visually scan the [limitless] log and find where the odd characters are. You could try an anagram, but let's just face it - they're not interested in your password, they're interested in finding out that you're doing something nonstandard or untoward (which, given what you're trying is rather impossible to hide) and canning you for it. Then, half out of spite, a member of Security will go through your keylogs with a fine-toothed comb and pwn you.

Face it. If your employer distrusts you sufficiently to log your every keystroke, they probably have a reason. And someone like me watching.
Top
wellwhoopdedooo
n00b
n00b
Posts: 69
Joined: Fri Mar 04, 2005 6:06 pm

  • Quote

Post by wellwhoopdedooo » Fri Jun 09, 2006 4:48 am

bobwhoops wrote:Ok--how about this?

I type my password in a span of like twenty minutes.

Type a letter, go edit a document, go back, add another...

Is that safe?
No God damn it! It's an incredibly trivial thing to also log which window and even which control on a given window a character is typed into.

Stop trying to break their security! It's not your computer. It's not your network. It's not your business. If you don't know all this stuff already, then you definitely don't know enough to stop from screwing yourself over through things that would be common sense to a security expert. Even if it was possible (which it's not), and we told you how to do it, it'd be like telling someone how to fly a plane, then having them jump in the plane and start flying. First time there's a cross breeze, you crash. Just stop! Give up! If you try to get away with this, I hope and pray you get caught. Any place that has a keylogger on every machine either has security so tight it vibrates, and they have it for a reason, and you're an asshole for trying to penetrate it, or they're a bunch of idiots and you should just look for another job.

Look, here's some examples of ways you will be caught even if you somehow manage to get around the keylogger:

The wrong someone will see the screen over your shoulder.
They have a screen monitoring app that you don't know about, and they look at the wrong time.
They notice an increase in traffic on a particular port.
They notice an increase in TCP_NODELAY packets.
They notice registry keys that indicate an SSH client.

Ah, fuck it. I could go on for hours. YOU CANNOT GET AROUND THIS DO NOT TRY. Don't try at future jobs either, even if they're a little more lax. If they have restrictions, they're there for a reason, DON'T TRY TO GET AROUND THEM. Do it on your own time. Shit like what you're trying to do might be the cause of the next 25 million SSNs getting stolen, and don't say that you're not risking that, because if you were able to say that and even be reasonably sure about it, you wouldn't have to ask these questions. Give up.
Top
lesourbe
l33t
l33t
User avatar
Posts: 710
Joined: Thu Nov 24, 2005 1:25 pm
Location: Champagne !
Contact:
Contact lesourbe
Website

  • Quote

Post by lesourbe » Fri Jun 09, 2006 5:08 am

the way to get around : live-CD in your friend's computer.
Is that a banhammer ?
LeSourbe, Member of EPowerforce.
Top
yabbadabbadont
Advocate
Advocate
User avatar
Posts: 4791
Joined: Fri Mar 14, 2003 12:02 am
Location: 2 exits past crazy

  • Quote

Post by yabbadabbadont » Fri Jun 09, 2006 7:12 am

One thing that wellwhoopdedooo didn't mention, and you can't get around even if you did know what you were doing, is they could also have *hardware* keyloggers installed. Other than screwing the guy next to you as was previously suggested, there isn't any way to circumvent those. Even if you did use someone elses computer, it would still be *your* information that got logged.
Bones McCracker wrote:On the other hand, regex is popular with the ladies.
Top
ToeiRei
Veteran
Veteran
User avatar
Posts: 1191
Joined: Mon Jan 03, 2005 10:50 am
Location: Austria
Contact:
Contact ToeiRei
Website

  • Quote

Post by ToeiRei » Fri Jun 09, 2006 8:14 am

You could use Single-Use Passwords which will work 1 time only.
USE="skey" emerge openssh

In other words - they can get the password you typed in. But it's useless then.

Rei
Please stand by - The mailer daemon is busy burning your messages in hell...
Top
Post Reply

11 posts • Page 1 of 1

Return to “Networking & Security”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic