Forum Settings
       
Reply To Thread

Protect Password From KeyloggerFollow

#1 Jun 04 2008 at 9:23 AM Rating: Good
***
1,142 posts
I've fooled around with a few RAT's, Remote Access Tools, which essentially could be used to spy on someone and "hack" them, but the point of this post is to possibly help people protect their passwords better. I personally have never seen a keylogger that picks up the hitting of the arrow keys, most will pick up backspace, enter, all those, but again I've never personally seen arrow keys picked up. So if you were to type your password in a way using arrow keys, a keylogger and hacker would be unable to figure out your password still, lets take an example...

Password: 123456789

You begin to enter the password in the wrong order

7, left arrow 2, 5, left left, 1, right right 6, left left 4, right right right 8, five left's for 3, five right's for 9.

That gives you your password of 123456789, but on a keylogger would appear as...

725164839

Obviously you would be using something a little more complicated as your password. And while this sounds like a pain and maybe a hair confusing, you would only do this while changing your POL password, and entering it to store on POL. Of course this password should be unique so you're not entering it elsewhere on your computer. I've heard people say if you store your password they can still hack and access it, that to me sounds like it involves hacking POL itself though...in which case we'd all be screwed no matter how much we protect ourselves, I don't think the password is stored anywhere on the computer. Most of the people getting hacked are getting hit with keyloggers. Anyway, I did this for myself and I think it would be a step in the right direction to help people protect their accounts.
____________________________
FFXI Card Game Project, Code Name: Ballista

http://s65.photobucket.com/albums/h204/OrbitzXT/FFXI%20TCG/?start=all
#2 Jun 04 2008 at 9:44 AM Rating: Good
***
2,793 posts
The only surefire defense form having your password stolen by a keylogger is to not get a keylogger on your system.

They don't just record keypresses anymore.
____________________________
The FFXI "community" needs an enima. If you doubt this, look at the forums on BG, ffxiah, and alla. If you STILL doubt this, visit 4chan. Note the similarities. Then light yourself on fire.

#3 Jun 04 2008 at 10:25 AM Rating: Good
**
516 posts
Actually it will pick up all the key strokes, including the arrow keys, not just letters and numbers
____________________________
"Plaque is a figment of the liberal media and the dental industry to scare you into buying useless appliances and pastes."
#4 Jun 04 2008 at 10:39 AM Rating: Good
Scholar
***
3,896 posts
How about if the game had all the letters and numbers you could use as your password in little boxes, floating around the screen and you had to click your mouse on them?

____________________________
ffxi: (retired) RDM,WHM,BLM,PLD,NIN,BLU,THF 75
WoW: PAL,SHA 80, ROG 80

#5 Jun 04 2008 at 10:44 AM Rating: Good
**
516 posts
You can do that through windows with virtual keyboard i believe.
____________________________
"Plaque is a figment of the liberal media and the dental industry to scare you into buying useless appliances and pastes."
#6 Jun 04 2008 at 10:48 AM Rating: Decent
***
2,793 posts
screencap and/or cache from saved password. Bam stolen password.
____________________________
The FFXI "community" needs an enima. If you doubt this, look at the forums on BG, ffxiah, and alla. If you STILL doubt this, visit 4chan. Note the similarities. Then light yourself on fire.

#7 Jun 04 2008 at 10:51 AM Rating: Good
Scholar
***
3,896 posts
thatdamnelf wrote:
screencap and/or cache from saved password. Bam stolen password.


Screencap every single time I click my mouse? And then send that screencap somewhere over the internet? That's a lot of data.

____________________________
ffxi: (retired) RDM,WHM,BLM,PLD,NIN,BLU,THF 75
WoW: PAL,SHA 80, ROG 80

#8 Jun 04 2008 at 10:56 AM Rating: Default
***
2,793 posts
graspee wrote:
thatdamnelf wrote:
screencap and/or cache from saved password. Bam stolen password.


Screencap every single time I click my mouse? And then send that screencap somewhere over the internet? That's a lot of data.



Its also been done before. Fast CPU+fast net connection and the victim may not even notice any lag from it. If the vic is on dialup they may complain of lag.


Ever used radmin or anything similar? Over dialup? I've seen Trojans that then download apps with nearly the same capabilities. Full real time display of the vics desktop in a resizable window.

Edited, Jun 5th 2008 9:40pm by thatdamnelf
____________________________
The FFXI "community" needs an enima. If you doubt this, look at the forums on BG, ffxiah, and alla. If you STILL doubt this, visit 4chan. Note the similarities. Then light yourself on fire.

#9 Jun 04 2008 at 11:00 AM Rating: Good
Sage
**
992 posts
Keyloggers are all also mouse loggers. That's how they tell (in other apps) when you've clicked on the username, password, or other fields. They also are all clipboard loggers, so they can tell if you copy & paste a username or password in from elsewhere.

So no, on-screen keyboard doesn't work, the mouse logger knows where you clicked, and also logs the positions of all windows whenever they are created or moved. Clicking random spots on the screen doesn't work to randomly enter parts of the password, they know when you click. Arrow keys don't work because they log all keystrokes.

Having a USB keyring that stores your password encrypted using 8096 bit PGP using a passphrase, set up so that when you insert the keyring it asks for your passphrase, then decrypts your password and uses the copy&paste function into POL, then writes random gibberish to that memory location 1000 times and unmounts the drive...that won't work. Keyloggers also track any changes to the clipboard.

My technique MIGHT work if it enters the password via direct keystroke events sent straight to POL, instead of copy&paste, since those might not get logged. But it's not surefire, they might get logged after all, I'm not familiar with the Windows API, or how most keyloggers hook into it.

Edit: catwho points out that the Flash virus going around is FFXI specific, and reads the password directly from POL's memory, so saved password or not, fancy way to enter it or not, it has your password once it detects POL trying to log you in, so no, even my "secure" method is worthless against an FFXI-specific attack, it could only "possibly" help against a vanilla keylogger.
Edit ends.

If you have a virus running on your machine designed to bone you, you are boned. Nothing can prevent the boning, only mitigate it somewhat.

Edited, Jun 4th 2008 3:34pm by Zaredx
____________________________
99 PUP 99 BST
Some other jobs too
Gear You Don't Care About: [✓]

#10 Jun 04 2008 at 11:05 AM Rating: Excellent
**
516 posts
Why not just use a firewall restricting all unknown outbound traffic?
____________________________
"Plaque is a figment of the liberal media and the dental industry to scare you into buying useless appliances and pastes."
#11 Jun 04 2008 at 11:07 AM Rating: Excellent
Needs More Smut
******
21,262 posts
Ismarc on Seraph, who was hacked, had plenty of time to dissect the keylogger that infected the systems through the flash ads while he was on hold earlier this week.

It's not a "key" logger, it's a memory resident virus that detects values from memory. So no matter what fancy methods you use for avoiding detection when you input a password, it'll still pick up the final value from memory.

____________________________
FFXI: Catwho on Bismarck: Retired December 2014
Thayos wrote:
I can't understand anyone who skips the cutscenes of a Final Fantasy game. That's like going to Texas and not getting barbecue.

FFXIV: Katarh Mest and Taprara Rara on Lamia Server - Member of The Swarm
Curator of the XIV Wallpapers Tumblr and the XIV Fashion Tumblr
#12 Jun 04 2008 at 11:18 AM Rating: Good
***
2,793 posts
Lord Rotz wrote:
Why not just use a firewall restricting all unknown outbound traffic?


And antivirus software to catch the pest before it even sends as well. Or lands on your hard drive for that matter.

There exsist more ways to snatch password than I can list.

Edited, Jun 4th 2008 3:19pm by thatdamnelf
____________________________
The FFXI "community" needs an enima. If you doubt this, look at the forums on BG, ffxiah, and alla. If you STILL doubt this, visit 4chan. Note the similarities. Then light yourself on fire.

#13graspee, Posted: Jun 04 2008 at 12:50 PM, Rating: Sub-Default, (Expand Post) So you're just going to redefine "keylogger" now then?
#14 Jun 04 2008 at 1:02 PM Rating: Good
***
2,793 posts
A lot of people lump everything together under the name "keylogger" now. As someone else pointed out, some don't even bother watching keys now. A lot of them are all-in-one. I don't see the naming convention as all that different from AV programs calling spyware a virus. Bad is bad is bad.

Method of input still won't matter on a compromised machine.
____________________________
The FFXI "community" needs an enima. If you doubt this, look at the forums on BG, ffxiah, and alla. If you STILL doubt this, visit 4chan. Note the similarities. Then light yourself on fire.

#15 Jun 05 2008 at 1:20 AM Rating: Default
Scholar
***
3,896 posts
thatdamnelf wrote:
A lot of people lump everything together under the name "keylogger" now. As someone else pointed out, some don't even bother watching keys now. A lot of them are all-in-one. I don't see the naming convention as all that different from AV programs calling spyware a virus. Bad is bad is bad.

Method of input still won't matter on a compromised machine.


It's just people being sloppy with language though. If anyone loses their account for any reason, they say they were "hacked". If it was a program of any kind and it took their password they call it a "keylogger".

It just annoys me that people abuse language like this, because then when people use the terms correctly people don't know exactly what they mean.

____________________________
ffxi: (retired) RDM,WHM,BLM,PLD,NIN,BLU,THF 75
WoW: PAL,SHA 80, ROG 80

#16 Jun 05 2008 at 5:17 AM Rating: Decent
Scholar
Avatar
*****
12,820 posts
graspee wrote:
Zaredx wrote:
Keyloggers are all also mouse loggers. That's how they tell (in other apps) when you've clicked on the username, password, or other fields. They also are all clipboard loggers, so they can tell if you copy & paste a username or password in from elsewhere.


So you're just going to redefine "keylogger" now then?


So still being in denial that keyloggers don't just log keystrokes these days?
____________________________

#17 Jun 05 2008 at 5:19 AM Rating: Decent
Scholar
***
1,590 posts
Viseziox wrote:
I've fooled around with a few RAT's, Remote Access Tools, which essentially could be used to spy on someone and "hack" them

Your limited experience really shows by your conclusions, you have no idea how sophisticated some of this stuff is.

There is NO sure-fire way of entering any keyboard-based authentication data that isn't vulnerable until Microsoft stop their craptastic software from allowing people to write code that hooks and injects itself into other processes.

And yes, 'keylogger' is a generic term, they long, long ago evolved from simple keyboard buffer sniffers.

Ultimately it's the God-forsaken design of Windows that allows this to happen. You're a fool if you think you can devise a scheme that protects you.

Edited, Jun 5th 2008 9:21am by Kragorn
#18 Jun 05 2008 at 6:08 AM Rating: Decent
Scholar
***
1,677 posts
Can a password still be stolen if you never type it in? >.> Mine is saved and already entered when I log on POL so all a keylogger would show is me clicking the log in button right?
____________________________
See You Space Cowboy
#19 Jun 05 2008 at 6:22 AM Rating: Good
***
1,422 posts
Not really, cause the unencrypted password will still be loaded into memory while it's being sent out, and a trojan (there, you guys happy now?) is almost certainly going to be looking for just that

Unfortunately, the way things stand, pretty much the only 100% surefire way to avoid getting a trojan, without being completely #*@&ing ******* paranoid to the point where you won't even boot up your computer, is to play on the PS2/PS3 and deal with that whole can of worms ><
#20 Jun 05 2008 at 6:43 AM Rating: Good
Sage
**
992 posts
Quote:
Can a password still be stolen if you never type it in? >.> Mine is saved and already entered when I log on POL so all a keylogger would show is me clicking the log in button right?


Oh yes, most definitely. I believe it is encrypted, but this accomplishes very little. In theory, you could skim through POL.exe and figure out the key, and decrypt the file yourself. In practice, this isn't necessary.

somewhere they have (something very roughtly like) :

if (saved_password) {
loadPassword(ID, password);
} else {
showLoginForm(ID,password);
}
loginToPol(ID,password);

loadPassword, I imagine, decrypts your saved file. loginToPol encrypts everything and sends it all to POL using whatever protocol it is they use.

But password is a variable. That means something with sufficient access can ask Windows what it's value is, if they know it's memory location, and the Windows kernel will TELL THEM. (This is also how most bots read from FFXI). So a FFXI specific password sniffer will sit there, watching the tasklist for POL.exe. Then it'll start watching that memory location. When it sees POL.exe starting to talk to the server, it KNOWS the contents of that memory location are your password. And it doesn't matter if you saved it, or typed it in, they have it.


I can think of one way around this: Have POL not store the password encrypted via symmetric encryption, but either one-way-hashed, or have it encrypted via a public key. Either way, this means the client given your password, can create a practically unique identifier based on your password, and the POL servers can confirm that it is your password, but the client never knows what your password is after it's been saved, it's for all intents and purposes, irretrievable. If it was hashed, it truly is irretrievable. If it's public key encrypted, only SE can decrypt it unless somebody steals or cracks their private key. In either case you'd need a key to use for the hashing/encrypting. The best way, to avoid them throwing a bot net at it and cracking in fairly short order, and also to avoid a known text attack (which all good schemes are secure against but which still weakens them somewhat), POL would use a unique key per POL ID. So the RMT would have to take your public key (which they can steal from your computer while they steal your encrypted password) and crack it individually, and repeat this intensive year-long process for every person, using a huge distributed botnet!

Like I said earlier, you are still boned in the sense that they can still steal your password and use it to log in as you, and send your **** to themselves. All this prevents is them knowing your password, and therefore, changing your password. It DOESN'T prevent them from changing your bank info for some reason, as when I just went to change my info it didn't ask me for a password! So SE has to fix that or they can just change your bank info, then call up SE and say they forgot their password, and here is their bank info! <.<

The only other thing I can think of, which isn't a unique idea at all, is IP whitelists. Have it completely optional so people won't complain, sure, but still have it. Let us set it sort of like you can do for any other server. For me:

Allow *.dsl.myisp.ca
Allow *.university.ca

There, that's me all set. If I'm ever logging in not from home, and not from a laptop at the university, I'll know about it ahead of time and update my allow list ;) If somebody tries to log in and they don't match the host mask, they can't connect period. Maybe I'm a rebel, I harshly violate the TOS and allow a friend to use my system. No problem, I can just add a hostmask for his ISP too, no sweat, but still am safe, nobody not on our ISPs can hack us. I guess this isn't fool proof...if they have this botnet, they can easily try to find somebody infected on your ISP (possibly you!) and use their worm as a proxy for their connection. But that's the only way.

Yes, you can spoof an IP address. Just like you can spoof a real address when you mail in an order form that says "Local Deliveries Only", but the package won't get to you!
____________________________
99 PUP 99 BST
Some other jobs too
Gear You Don't Care About: [✓]

#21 Jun 05 2008 at 12:27 PM Rating: Default
Scholar
***
3,896 posts
Mistress Theonehio wrote:
graspee wrote:
Zaredx wrote:
Keyloggers are all also mouse loggers. That's how they tell (in other apps) when you've clicked on the username, password, or other fields. They also are all clipboard loggers, so they can tell if you copy & paste a username or password in from elsewhere.


So you're just going to redefine "keylogger" now then?


So still being in denial that keyloggers don't just log keystrokes these days?



I didn't say that it is not the case that some keyloggers also do other things but I take exception to someone saying that ALL keyloggers are also mouse loggers and are ALL also clipboard loggers.

____________________________
ffxi: (retired) RDM,WHM,BLM,PLD,NIN,BLU,THF 75
WoW: PAL,SHA 80, ROG 80

#22 Jun 05 2008 at 1:15 PM Rating: Excellent
Sage
***
1,807 posts
Zaredx wrote:
I can think of one way around this: Have POL not store the password encrypted via symmetric encryption, but either one-way-hashed, or have it encrypted via a public key... [snip]
Like I said earlier, you are still boned

It doesn't matter how POL stores the password. No matter what sort of encryption or hashing are used, and no matter how many hoops you jump through, if POL can use that secret to log in, a hacker* can steal it and have his POL log in as you. And if POL doesn't store the password, or requires some sort of user input to decode before logging in, a hacker* can always intercept your input and use that to log in as you.

The only way around this would be to have single use passwords. You'd essentially need to have a book of passwords that would all be usable one time. The RSA key fobs you see people carry around to log into VPNs with are a variant of this concept. It wouldn't matter if a hacker could intercept your password then** because it wouldn't be any good once it was used or otherwise expired. This entire scheme depends, however, on the user having to enter a password every time. If you store the whole "book" of passwords on your machine so POL can log in automatically, you're right back at square one (hacker steals book, user is screwed).

Anyhow, as amusing as it is to see many people scream and speculate about ways to prevent these repeat hacking sprees, I'll tell everyone (and probably get flamed for it) that it's not as easy as you think. Yes, SE should fix sh*t. And yes, there are ways. But even professionals who have designed and implemented secure systems can and do make mistakes or leave unintentional holes. Amateurs basically have zero chance of getting it right, and that includes damn near everyone who visits alla.

*In these cases, I'm specifically referring to a hacker who is able to run the code of his choice on your machine.
**Unless he got it in real time and managed to log in before you. That would be another problem to solve, but not impossible.

Edited, Jun 5th 2008 5:23pm by VxSote
____________________________
VxSote: "He Who Stands in Smoking Crater"
BLM, WHM, RNG, RDM, SCH, NIN 99 -- Fenrir (Unicorn) -- Gold 100+, Synergy 80, all subs 60+.
Another Look at Conserve MP
Leader, Screwdriver Dynamis Linkshell
#23 Jun 05 2008 at 2:30 PM Rating: Excellent
***
1,349 posts
graspee wrote:

I didn't say that it is not the case that some keyloggers also do other things but I take exception to someone saying that ALL keyloggers are also mouse loggers and are ALL also clipboard loggers.



Well, technically keyloggers really just log keystrokes and may not even be malicious. Password trojans, on the other hand, steal passwords and usually have keylogging functionality in addition to a rather extensive set of tricks. It's really semantic, though.

One could even argue the use of the term "virus" since these trojans don't spread by self replicating. But that's not going to help anyone protect their computers any better.

In any case, the important thing is that people understand their passwords aren't protected just because they don't type them in. Using the term "keylogger" for "password trojan" may have confused some people.
____________________________
(f;,,;)f (/o.o)/
Reply To Thread

Colors Smileys Quote OriginalQuote Checked Help

 

Recent Visitors: 0 All times are in CDT