Skip to main content

Questions tagged [keyloggers]

A software (and sometimes hardware) module which perform keystroke logging (more often called keylogging or "keyloggers"), which is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

2 votes
1 answer
207 views

Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged. so basically, the bad usb cable and the usb charger is ...
Maxfield's user avatar
  • 157
1 vote
0 answers
78 views

How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Objective I've come into possession of some data that I'd like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can't tolerate an outsider ...
Frizzle McGrindnose's user avatar
1 vote
1 answer
109 views

Can Firejails protect against malicious links?

I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
Dion's user avatar
  • 121
0 votes
0 answers
84 views

Surreptitiously surveil a logged out laptop AD workstation's keyboard with temporary physical access?

I can think of multiple ways to surveil a logged out computer with temporary physical access. The first is installing a hardware keylogger which would enable one to get all the keystrokes from it; ...
Seci Pedia's user avatar
1 vote
1 answer
278 views

What are the risks of reusing the same passphrase for FDE, user account, and password manager?

Consider a home user who runs Linux on a laptop with full-disk encryption and uses a cloud-based password manager. Assume the laptop is firewall-protected with no SSH access. It seems reasonable to ...
jth's user avatar
  • 123
0 votes
0 answers
161 views

Can a Remote Desktop software prevent windows 10 keylogger from accessing what is typed on client computer during a session to a remote computer?

The “improve inking and typing” setting in Windows 10 allows Microsoft to send themselves processed samples of what is typed on a machine (not sure if it is processed to remove details as it’s typed ...
AndroidUser558's user avatar
0 votes
1 answer
176 views

Keylogging virtual machine from host

Can a keylogger in a host machine capture keystrokes in virtual OS? I'd like to get into cryptocurrencies but I don't know if my machine (mac) is secure. So I thought I could create a VM for it but I ...
user277849's user avatar
0 votes
0 answers
110 views

Most Secure ways to to authorize clients on their devices that are remotely connected by (AnyDesk, TeamViewer, etc...) without knowing the password

My case is I'm designing an app based on chromium browser powered by Electron . And I need sometimes to log the clients in with some web apps. The password is only visible as dots in browsers by ...
a.badawi's user avatar
1 vote
1 answer
308 views

Is it safe to use a Dell knock-off keyboard? [duplicate]

Purchased a Dell wired keyboard scanned its QR code to check authenticity. The URL was http://dell.vt9999.com/fw.aspx?c=1670918927095916 and it says the product is authentic but link looks suspicious ...
Nilesh Yadav's user avatar
0 votes
0 answers
40 views

Is it possible to be infected without installing anything like said at the beginning of the video? [duplicate]

It seems like a 'crazy' claim that John McAfee makes at the very beginning of this video, is it true? "Over half of all smartphones, both iOS and Android are infected with keystroke logging ...
stackexchanged's user avatar
2 votes
1 answer
2k views

How seriously should we take this commentary from John McAfee? If it's serious, what do we do? [closed]

This question refers to this YouTube video of John McAfee Because videos can disappear, I've provided a screenshot and transcript (transcribed by me, so please forgive errors) What John is saying ...
Stewart's user avatar
  • 343
1 vote
2 answers
143 views

Using Chrome on non-trusted macOS computer

So I'm using an untrusted computer but on a trusted network (my home). The operating-system + hardware are trusted but the Profiles, certificates & software installed in the system are not trusted....
Luca Matteis's user avatar
0 votes
0 answers
48 views

Wondering if a USB dongle for gaming controller could have malware installed [duplicate]

I purchased a usb gaming controller used. It has a usb dongle that plugs into the PC and a I assume its bluetooth. Is it possible for the USB dongle to contain a keylogger that starts up when I plug ...
Eric Anderson's user avatar
0 votes
2 answers
240 views

Is there a type of login security that is keylog and screen capture proof that doesnt require a 2nd device?

I am looking for a login security measure where it is keylog and screen capture proof. Is there some type of login security like a 2FA without the need of a second device, but remembering a pattern or ...
Patoshi パトシ's user avatar
2 votes
1 answer
1k views

Bitwarden and gamecontrollerd on OsX Big Sur

Recently, I came across an issue concerning a daemon named gamecontrollerd in OsX Big Sur. On my laptop I'm running ReiKey (from Objective-See), which aims at identifying possible Key Loggers that ...
FancyPants's user avatar
5 votes
3 answers
1k views

Can a website keylog you outside a virtual machine

I came across a suspicious website called keylog.me (you can already tell from the name). I was as curious as heck to find out what it does, so I got on a VM (Fedora Linux which I reinstalled later) ...
somebody6000's user avatar
1 vote
0 answers
139 views

can I trust apple notebooks or are there some bios level keyloggers from apple/other agency used? [closed]

I need to look for something on deep web but having macbook air, I feel that it could be rooted from apple / reseller - my idea is that there is some chip logging every key stroke and then send it ...
Ondrej's user avatar
  • 11
1 vote
1 answer
620 views

Can keyloggers read what's in a field, or only your keyboard inputs? What about mouse movement?

I thought of a simple way to throw keyloggers off when typing sensitive information into a field, however this method presupposes that the keylogger can't actually read what's in the field, and also ...
Lolpingu's user avatar
1 vote
2 answers
1k views

How to protect my ubuntu linux computer from screen capture programs or keystroke loggers?

I have a Ubuntu home PC. I often use this system to enter passwords to various websites. Some sites also offer a graphical on screen keyboard to protect from keyloggers. However, I suspect that even ...
user15740's user avatar
  • 111
0 votes
1 answer
546 views

Can MDM on an iPhone restrict custom keyboard usage?

I have an iPhone that runs 13.3.1 (latest at this time). It's a corporate phone and has an MDM profile installed. I've been using the phone for almost 2 years now with a custom keyboard (Google ...
Izy-'s user avatar
  • 873
-1 votes
1 answer
168 views

How can you manually bypass admin access (or gain it) and add a program to startup? [closed]

I was looking into keyloggers and wanted to understand how does someone get a keylogger to run every time the target computer is active (obviously a program that targets this purpose, but an ...
RonsJurisdiction's user avatar
20 votes
2 answers
5k views

Can keylogger software exist solely on a keyboard PCB?

I am looking to build a custom keyboard and bring it to work, but the security department is extremely wary of keyloggers, and rightly so. Now, my understanding of hardware keyloggers is that they are ...
darkmnemic's user avatar
1 vote
1 answer
1k views

Keylogger on an SD Card?

Can an SD card be used as a medium of implementing a keylogger? The location of an SD card slot on some laptops is such that it is impossible to see if it contains a card in it unless you deliberately ...
kat's user avatar
  • 411
1 vote
2 answers
235 views

Can you trust your computer devices to be safe to use if they have been in the hands of potential hackers? [duplicate]

Suppose you lose the bag containing your laptop along with its accessories or while travelling the police confiscate all your computer devices, can you safely use all the devices again if you format ...
Linux_user0987's user avatar
0 votes
1 answer
276 views

Was my password copied? [closed]

I work locally with a WordPress site. When I logged in, it looked like the password was highlighted. It went very fast. Half a second maybe. I found it strange that it looked like it was marked, as in ...
fk76's user avatar
  • 1
0 votes
4 answers
510 views

Attacks on password-based encryption

Frequent attacks on password-based encryption are dictionary attacks with special hardware. I suspect that this is the only promising attack on the ciphertext. Is that correct? Another attack ...
BeloumiX's user avatar
  • 256
1 vote
1 answer
699 views

preventing cross iframe key logging in javascript

We have a web application, where other partners can include their pages as iframes. We implemented a server-to-server way of authenticating users for the iframes, but one partner doesn't want to ...
peter's user avatar
  • 113
1 vote
2 answers
284 views

What information can mouse recorders get?

In comparison to keyloggers, mouse recorders do not seem to be able to obtain much sensitive information. For example, passwords, credit card numbers, email addresses, names, passport numbers, etc. ...
Flux's user avatar
  • 923
0 votes
2 answers
371 views

Keylogging host from virtual machine

Can a keylogger in a virtual machine (guest OS) capture keystrokes in host OS? Is there any way to do it?
mustang's user avatar
  • 29
-1 votes
5 answers
3k views

How do keyloggers tell it's a password? (And how to fool them.)

This question also applies to clipboard monitoring. Imagine you are planning to deploy 100,000 copies of a Windows trojan with keylogger functionality. (For the record, I'm not talking about myself ...
sigil's user avatar
  • 139

15 30 50 per page
1
2 3 4 5
8