LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-01-2005, 01:25 PM   #1
blancs
Member
 
Registered: Mar 2005
Posts: 49

Rep: Reputation: 15
key logging?


I just wanted to know when dealing with key loggers, What would be a normal routine for searching them out. I really don't know what I am looking for other than odd process. Also packet sniffers. What are signs?
 
Old 03-01-2005, 02:14 PM   #2
draxen
Member
 
Registered: Nov 2004
Posts: 43

Rep: Reputation: 15
I don't think there would be any signs. As you said, odd process might be the only clue.
I would assume that in rder to log keystrokes or log network traffic the process would have to be running as root.
The easiest way would be to obtain the list of running processes and then "googling" for the ones that look suspicious.
 
Old 03-01-2005, 02:41 PM   #3
blancs
Member
 
Registered: Mar 2005
Posts: 49

Original Poster
Rep: Reputation: 15
Yea I was going to sit down and google the majority of the processes. Since this is a university server though, I haven't a idea of half the stuff running so it would be alot to go through. The only thing I could come up with was some sort of shell wrapper that would log every thing.. I'm just scared for the obvious reasons, safety of my passwords and the usual talking bad about my boss. heh thanks for your reply
 
Old 03-02-2005, 07:35 AM   #4
draxen
Member
 
Registered: Nov 2004
Posts: 43

Rep: Reputation: 15
Let me point out a few things:
To log your keystrokes on unix, there are two possible paths to do it:
1) detectable
call a wrapper from your .profile or global .profile (or .bashrc etc.), or set your shell in /etc/passwd to a wrapper. You can see them running and you can discover them by looking into the above files
2) undetectable
use modified programs, like getty or shell. In that case you'll see what looks like legit process and you can't tell the difference unless you are the system administrator.

#2 usually means that the system has beed compromised. I don't think sysadmin would do that unless it was a company policy or something like that.
#1 is not very useful unless the user does not have a clue at all, otherwise it's pretty easy to figure it out.

Hope this helps
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Cross Platform Key Logging on Linux & Windows WarlockofVirgo Linux - Security 3 08-31-2004 07:31 PM
How to bind Windows key combos and laptop Fn key MDesigner Linux - Newbie 12 08-15-2004 03:08 AM
GPG Data, Secret Key but no Public Key? Aeiri Linux - Software 5 07-20-2004 06:00 PM
using red-carpet without logging out and logging as root. packman Linux - Software 1 12-09-2002 02:55 AM
RSA public key encryption/private key decription koningshoed Linux - Security 1 08-08-2002 07:25 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:45 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration