Not all that glitters is gold. Keyloggers can exist as part of a honeypot, PCI tool, management or systems administration utility or even a simple trojan virus.It's becoming more and more common to log all root keystrokes in layers of trust and secrecy that systems administrators don't even immediately recognize are there.Many keyloggers exist, but the three most often deployed in systems include:1) Pam Daemon/Systems Level: rootsh utility, which allows you to enable a systems logger that will show everything logged to the terminal whenever anyone invokes sudo.
http://freshmeat.net/projects/rootsh/Many inplementations recommend renaming rootsh to another seemingly innocous sounding word - like "termd".The use of rootsh and other keyloggers for root is exceptionally useful should you have more than one systems administrator, or want to keep track of changes on production systems. PCI compliance and SOCKS both require controls in place for the root or administrative user.The logs, (which by default log to /var/log/rootsh/ which can be changed upon implementation) of course, can be edited, like any logs, unless you utilize a stunnel or other syslog-ng single network loghost with limited access, which is yet another recommendation for a secure administration.Systems level keyloggers (from the "old school") include console and tty device logging:
http://freeworld.thc.org/papers/writing-linux-kernel-keylogger.txt2) Kernel level:Sebek clients (with Honeywall server) provide nearly invisable logging capacity for honeypot and systems administration monitoring.
http://www.honeynet.org/tools/sebek/Sebek is a kernel module that is available for Windows machines also. 3) Hardware based tools.These masquerade as a USB to PCI or other conversion tool and most often deployed at NOCs with KVM's that don't also provide tty capacity.
http://www.keelog.com/download.htmlThese are especially useful, however the most saavy systems administrators usually see the terminal pause and flash that accompany use of a hardware logger. SO if you feel you ARE BEING WATCHED, you ARE. [I personally I can't type when watched!]The legal ramifications of micro-critique of a systems administrator or engineer for making such typing mistakes is problematic due to the non-exempt federal statutes for professionals, (since the FLSA standards requires us to be able to work without micro-direction) but be advised, all high level responsible actions are logged post 2001 in America!
http://www.lieffcabraser.com/itovertime.htmTrojan Keyloggers:
http://www.youtube.com/watch?v=fVy82nFcvVgwww.Obnosis.com |
http://en.wiktionary.org/wiki/Citations:obnosis |
http://www.urbandictionary.com/define.php?term=obnosis (503)754-4452Catch the January PLUG HackFest! Kristy Westphal, CSO for the Arizona Department of Economic
Security will provide a one hour
presentation on forensics.Laugh at this MSN Advertisement:
_________________________________________________________________
Color coding for safety: Windows Live Hotmail alerts you to suspicious email.
http://windowslive.com/Explore/Hotmail?ocid=TXT_TAGLM_WL_hotmail_acq_safety_112008 ---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss