Bitcoin Forum
May 09, 2024, 06:23:19 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: 1 2 [All]
  Print  
Author Topic: How to make sure your machine isn't software key logged ?  (Read 3012 times)
Coincrazy (OP)
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
April 20, 2013, 02:59:42 PM
 #1

Hi

I have 100% access to my machine or at least the repair / service guys do the service supervised

So a hardware key logger would be almost impossible

However a software key logger could be possible

How do I ensure that my machine does not have a software key logger ? I.e. that a software key logger isn't already on my machine ?

I use windows


TIA

Regards

Cc
1715235799
Hero Member
*
Offline Offline

Posts: 1715235799

View Profile Personal Message (Offline)

Ignore
1715235799
Reply with quote  #2

1715235799
Report to moderator
1715235799
Hero Member
*
Offline Offline

Posts: 1715235799

View Profile Personal Message (Offline)

Ignore
1715235799
Reply with quote  #2

1715235799
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715235799
Hero Member
*
Offline Offline

Posts: 1715235799

View Profile Personal Message (Offline)

Ignore
1715235799
Reply with quote  #2

1715235799
Report to moderator
1715235799
Hero Member
*
Offline Offline

Posts: 1715235799

View Profile Personal Message (Offline)

Ignore
1715235799
Reply with quote  #2

1715235799
Report to moderator
flavius
Full Member
***
Offline Offline

Activity: 154
Merit: 100


welcome to riches


View Profile
April 20, 2013, 03:01:28 PM
 #2

dont download .exes from random emails?

Quote
crime generates tenfold more money then real businesses do in bitcoin. the fact you cant accept this just makes you a kike

A reply of yours, quoted below, was deleted by the starter of a self-moderated topic. There are no rules of self-moderation, so this deletion cannot be appealed. Do not continue posting in this topic if the topic-starter has requested that you leave.

You can create a new topic if you are unsatisfied with this one. If the topic-starter is scamming, post about it in Scam Accusations.
pekv2
Hero Member
*****
Offline Offline

Activity: 770
Merit: 502



View Profile
April 20, 2013, 03:01:54 PM
 #3

Anti-Keylogger is trial-freeware and pay for.

Take a read here.
Stay Safe
FTWbitcoinFTW
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
April 20, 2013, 03:08:35 PM
 #4

Just no way if the hacker use personnal / modified  source code.

Use Linux or offline PC in any important BTC transaction.
Use 2FA in any hot wallet or sensitive emails

A little trick on unsafe computer : when you start filling your password, you move and clik on the page, type 5 random caracter and come back to finish

Result :
password 12345
What is keylogged : 124$erRZ45

Lost coins only make everyone else's coins worth slightly more. Think of it as a donation to everyone.
it has lots of buttery taste..
btcbug
Sr. Member
****
Offline Offline

Activity: 399
Merit: 250


View Profile
April 20, 2013, 03:47:26 PM
 #5


A little trick on unsafe computer : when you start filling your password, you move and clik on the page, type 5 random caracter and come back to finish

Result :
password 12345
What is keylogged : 124$erRZ45

Wouldn't a decent keylogger also be recording mouse clicks and if you activated another text box and typed in random garbage it would be easy for the hacker to distinguish?
FTWbitcoinFTW
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
April 20, 2013, 03:56:57 PM
 #6

It's not in a other text box, this is the trick

Quote
The keylogger sees everything, but it doesn’t understand what it sees. The browser also sees everything, but it doesn’t use everything that it sees: it does not know what to do with keys that are typed anywhere other than the text entry fields, and lets them fall on the floor. The keylogger has no easy way to determine which keys are used by the browser and which fall on the floor.

http://arvindn.livejournal.com/123183.html


It's not 100% safe, but a good advice !

Lost coins only make everyone else's coins worth slightly more. Think of it as a donation to everyone.
it has lots of buttery taste..
doobadoo
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
April 20, 2013, 04:13:56 PM
Last edit: April 21, 2013, 02:16:28 AM by doobadoo
 #7

DON'T RUN WINDOWS AND BITCOIN YOU WILL EVENTUALLY LOSE YOUR WALLET!!!

Get an external USB 3.0 hard drive for like $50 bucks.   Or buy a 32 GB FAST flash card for about the same if you have an sdxc slot ( http://www.amazon.com/SanDisk-Extreme-Class-Memory-SDSDX-032G-AFFP/dp/B007M54E1M/ref=sr_1_3?ie=UTF8&qid=1366473824&sr=8-3&keywords=fast+sdxc )

Download your favorite flavor of linux right from the distro's sight.  Format and install on your external hd/flash card.  Boot from the external drive and run the os's updater, then install bitcoin.

launch firefox.
1)  Go to Tools-->Addons--->plugins and disable java
 2) now hit the addons tab and install addon called NoScript.  
3)restart FF.  

4)  before browsing to sites like mtgox, or blockinfo, enter private browsing mode,
5) Got to the bar at the bottom of browser window and click the "S" icon.   Make NoScript "Forbid Scripts Globally"
you may need to go back to the S icon and allow certain scripts to make the these sites work correctly.  Do so on a one by one basis, and only scripts that come from those sites or have domains you recognize.

6) don't be logged into anything else or have open tabs to other pages when using mt.gox etc.  Not even bitcointalk.org

7)  log out of mtgox or other online wallets. then exit private browser mode.  you can now set noscript back to allowing scripts globally for regular browsing

Don't install additional software on your linux drive.  If you must, make sure you get it from the package manager, and that it is a well followed project that is open source and would be highly unlikely to insert attack code.  Don't install adobe flash.

**EDIT***
Oh yeah, on linux machines the Firefox plugin to disable java is called iced-tea.  you know they rename everything with linux...  Java --->Iced Tea.  Those C++ Jokers!

"It is, quite honestly, the biggest challenge to central banking since Andrew Jackson." -evoorhees
Coincrazy (OP)
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
April 20, 2013, 06:06:30 PM
 #8

Thanks to all who replied

cho
Full Member
***
Offline Offline

Activity: 155
Merit: 100


Boar with me


View Profile
April 20, 2013, 06:54:56 PM
 #9

there's a simple trick no keylogger I know of can fight against.
1. Open some text editor
2. Type "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789,.;-_"... (I typed alphabetically as an example, but a simpler and better strategy is to hit every key on the keyboard in sequence)
3. Copy/paste each character in your password one by one.

This is very solid against keyloggers.
It's a pain with long passphrases, though.
It's very bad against the "people in your back looking over your shoulder" attack too Smiley

1KEWxTkXPgfB9MdHJcfyoVnfHRnYEHQJPw
cho
Full Member
***
Offline Offline

Activity: 155
Merit: 100


Boar with me


View Profile
April 20, 2013, 07:03:00 PM
 #10

After having written the last post with the copy/paste trick, I've been thinking about this.
What about a keylogger that would log the full content of a textbox everytime it changes ? Has anyone ever seen this in action ? Sounds like a good strategy for a keylogger, isn't it ?

1KEWxTkXPgfB9MdHJcfyoVnfHRnYEHQJPw
Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
April 20, 2013, 07:22:57 PM
 #11

Back up your files reinstall OS from a boot-up CD. Thats the only real way of making sure.

CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
NoL1m1tZ
Member
**
Offline Offline

Activity: 80
Merit: 10


View Profile
April 20, 2013, 09:23:01 PM
 #12

There is a whole lot of stupid going on in this thread... If you're scared that you have a keylogger disconnect from the internet, boot into a live session of ubuntu, run the obvious virus scans, then reinstall windows. If your smart though you will never have to worry about that.
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 20, 2013, 09:50:36 PM
Last edit: April 21, 2013, 12:58:25 AM by bitsalame
 #13

there's a simple trick no keylogger I know of can fight against.
1. Open some text editor
2. Type "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789,.;-_"... (I typed alphabetically as an example, but a simpler and better strategy is to hit every key on the keyboard in sequence)
3. Copy/paste each character in your password one by one.

This is very solid against keyloggers.
It's a pain with long passphrases, though.
It's very bad against the "people in your back looking over your shoulder" attack too Smiley
Sounds good if it is a simple keylogger, but sophisticated monitoring software also logs the clipboard.

Just no way if the hacker use personnal / modified  source code.

Use Linux or offline PC in any important BTC transaction.
Use 2FA in any hot wallet or sensitive emails

A little trick on unsafe computer : when you start filling your password, you move and clik on the page, type 5 random caracter and come back to finish

Result :
password 12345
What is keylogged : 124$erRZ45
The clicking-away-from-the-box-and-then-click-back method would be detected by a software key logger definitely. It doesn't know where you are clicking, but detects the clicks.
Therefore it will be trivial for a human to realize that something is off when he sees something like:

[Active Windows: Chrome - MtGox]
Your@account[TAB]pass[LEFT CLICK]*&3q[LEFT CLICK]word
RenegadeMind
Copper Member
Hero Member
*****
Offline Offline

Activity: 1380
Merit: 504


THINK IT, BUILD IT, PLAY IT! --- XAYA


View Profile WWW
April 21, 2013, 12:41:54 AM
 #14

There is a whole lot of stupid going on in this thread... If you're scared that you have a keylogger disconnect from the internet, boot into a live session of ubuntu, run the obvious virus scans, then reinstall windows. If your smart though you will never have to worry about that.

+1

The only real way is to have a seriously hardened machine (firewalls, AV software, ports blocked at the hardware level, etc.) and use that machine ONLY for BTC transactions and nothing more. Take it offline when not using it to complete a transaction (i.e. remove the physical connection and do not rely in 'soft' ways, such as disabling a NIC through software).

Whether that machine is from a live CD or whatever is another question, and largely unimportant as far as I can tell. The point is that the machine must be hardened and dedicated and offline except when needed.

bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 21, 2013, 01:03:02 AM
 #15

In short, in security it is said that a compromised computer isn't your computer anymore.
There isn't a way of being SURE that something doesn't exist, and antivirus software will always throw a false negative if a malware is new and they don't have a signature for it.

If you suspect the possibility of being infected, delete everything, reinstall a clean OS (don't use warez, if you want free, use free open source software) and use it only for bitcoins.
Anon136
Legendary
*
Offline Offline

Activity: 1722
Merit: 1217



View Profile
April 21, 2013, 01:07:32 AM
 #16

There is a whole lot of stupid going on in this thread... If you're scared that you have a keylogger disconnect from the internet, boot into a live session of ubuntu, run the obvious virus scans, then reinstall windows. If your smart though you will never have to worry about that.

+1

The only real way is to have a seriously hardened machine (firewalls, AV software, ports blocked at the hardware level, etc.) and use that machine ONLY for BTC transactions and nothing more. Take it offline when not using it to complete a transaction (i.e. remove the physical connection and do not rely in 'soft' ways, such as disabling a NIC through software).

Whether that machine is from a live CD or whatever is another question, and largely unimportant as far as I can tell. The point is that the machine must be hardened and dedicated and offline except when needed.

hey ren how do you hardware block ports?

Rep Thread: https://bitcointalk.org/index.php?topic=381041
If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
RenegadeMind
Copper Member
Hero Member
*****
Offline Offline

Activity: 1380
Merit: 504


THINK IT, BUILD IT, PLAY IT! --- XAYA


View Profile WWW
April 21, 2013, 01:10:46 AM
 #17

antivirus software will always throw a false negative if a malware is new and they don't have a signature for it.

This is not true.

You can legitimately hook into keyboard events, e.g. Any program that has global hotkeys must hook the keyboard.

This is common behaviour in some malware, and the basic technique for keyloggers.

So it is not true that AV software will ALWAYS catch malicious behaviour for unknown threats.

Yes, it will OFTEN detect things like keyboard hooks, but not ALWAYS.

You can go to a programming site, like The Code Project, and download software that hooks the keyboard. Just search for "keyboard hook" or "keylogger". You'll see (most likely) that your AV software does not detect it as malware. You can then add code to send the hooked info to some address and see if it is then detected.

RenegadeMind
Copper Member
Hero Member
*****
Offline Offline

Activity: 1380
Merit: 504


THINK IT, BUILD IT, PLAY IT! --- XAYA


View Profile WWW
April 21, 2013, 01:29:12 AM
 #18

hey ren how do you hardware block ports?

Hahaha! Cheesy

Well, I haven't done this in a very long time, so off the top of my head, I can't remember the specifics.

This is very old (2006), and applies to Windows XP (or Windows 2003 server - I forget):

http://renegademinds.com/Home/Blog/tabid/60/EntryID/57/Default.aspx

However, the "Options" tab seems to be missing in Windows 7. (Could be a driver issue as well though...)

Ok - After looking around, it seems there's an answer here at Stack Exchange:

http://serverfault.com/questions/197900/where-did-tcp-ip-filtering-go-in-windows-server-2008

Not sure I like the "new" way of doing things... Seems kind of crappy to me. Oh well.

I don't know how to do it on Linux though. But, given how configurable Linux is, there must be a way - just that I don't know it.


bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 21, 2013, 01:39:47 AM
 #19

antivirus software will always throw a false negative if a malware is new and they don't have a signature for it.

This is not true.

You can legitimately hook into keyboard events, e.g. Any program that has global hotkeys must hook the keyboard.

This is common behaviour in some malware, and the basic technique for keyloggers.

So it is not true that AV software will ALWAYS catch malicious behaviour for unknown threats.

Yes, it will OFTEN detect things like keyboard hooks, but not ALWAYS.

You can go to a programming site, like The Code Project, and download software that hooks the keyboard. Just search for "keyboard hook" or "keylogger". You'll see (most likely) that your AV software does not detect it as malware. You can then add code to send the hooked info to some address and see if it is then detected.

Do you understand the term "false negative"?
RenegadeMind
Copper Member
Hero Member
*****
Offline Offline

Activity: 1380
Merit: 504


THINK IT, BUILD IT, PLAY IT! --- XAYA


View Profile WWW
April 21, 2013, 01:47:30 AM
 #20

antivirus software will always throw a false negative if a malware is new and they don't have a signature for it.

This is not true.

You can legitimately hook into keyboard events, e.g. Any program that has global hotkeys must hook the keyboard.

This is common behaviour in some malware, and the basic technique for keyloggers.

So it is not true that AV software will ALWAYS catch malicious behaviour for unknown threats.

Yes, it will OFTEN detect things like keyboard hooks, but not ALWAYS.

You can go to a programming site, like The Code Project, and download software that hooks the keyboard. Just search for "keyboard hook" or "keylogger". You'll see (most likely) that your AV software does not detect it as malware. You can then add code to send the hooked info to some address and see if it is then detected.

Do you understand the term "false negative"?

Blech. Sorry. Guess I need more coffee... Sad My bad. I somehow was thinking false positive.

Behaviour filters (heuristics) *could* pick up the behaviour, but... that goes to what I'd mentioned above, and not false negatives.

doobadoo
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
April 21, 2013, 02:00:38 AM
 #21

Back up your files reinstall OS from a boot-up CD. Thats the only real way of making sure.

I thought we had to take off and nuke the whole site from orbit.  Its the only way to be sure.

"It is, quite honestly, the biggest challenge to central banking since Andrew Jackson." -evoorhees
Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
April 21, 2013, 02:27:48 AM
 #22

Back up your files reinstall OS from a boot-up CD. Thats the only real way of making sure.

I thought we had to take off and nuke the whole site from orbit.  Its the only way to be sure.
Don't troll. AVs are a joke and if you've got a lot of money in bitcoin wallets its not worth risking it on your own ability to identify keyloggers. Could be a rootkit for all you know in which case you're really screwed.


CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 21, 2013, 02:57:51 AM
 #23

Back up your files reinstall OS from a boot-up CD. Thats the only real way of making sure.

I thought we had to take off and nuke the whole site from orbit.  Its the only way to be sure.

Considering how valuable are these digital goods, there would be no problem in investing time and money in developing some very nasty 0 ring rootkits.
Even if you scan with an AV a harddrive as slave or from a bootable disk, it still doesn't ensure the cleanness of a drive if it wasn't on a sterile environment... ESPECIALLY if it is running Windows.

Considering the AmiBIOS source leak, accessing ring 0 would be trivial, and a BIOS Rootkit would be impossible to be cleaned up by an AV.
I would normally not worry that much, but with bitcoins a certain level of paranoia is expected.

There is no need of worrying as long as you follow very simple rules:
Ideal:
1) Nuke everything and start from zero.
2) Make a new partition and install Linux
3) Never use root
4) Use that partition only for Bitcoins and never use it for leisure browse anything.

If you are using Windows 7 (if you are still using previous version, you better kill yourself):
1) Nuke everything and start from zero.
2) Create a user with user privileges.
3) Use sandboxie for browsing, even with Chrome. Thinking of it... better sandbox everything. Sandboxie is your internet condom. Cherish it, learn to love it.
4) Use Kaspersky Antivirus. Better something than nothing.
Kazu
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
April 21, 2013, 04:19:03 AM
 #24

Back up your files reinstall OS from a boot-up CD. Thats the only real way of making sure.

I thought we had to take off and nuke the whole site from orbit.  Its the only way to be sure.

Considering how valuable are these digital goods, there would be no problem in investing time and money in developing some very nasty 0 ring rootkits.
Even if you scan with an AV a harddrive as slave or from a bootable disk, it still doesn't ensure the cleanness of a drive if it wasn't on a sterile environment... ESPECIALLY if it is running Windows.

Considering the AmiBIOS source leak, accessing ring 0 would be trivial, and a BIOS Rootkit would be impossible to be cleaned up by an AV.
I would normally not worry that much, but with bitcoins a certain level of paranoia is expected.

There is no need of worrying as long as you follow very simple rules:
Ideal:
1) Nuke everything and start from zero.
2) Make a new partition and install Linux
3) Never use root
4) Use that partition only for Bitcoins and never use it for leisure browse anything.

If you are using Windows 7 (if you are still using previous version, you better kill yourself):
1) Nuke everything and start from zero.
2) Create a user with user privileges.
3) Use sandboxie for browsing, even with Chrome. Thinking of it... better sandbox everything. Sandboxie is your internet condom. Cherish it, learn to love it.
4) Use Kaspersky Antivirus. Better something than nothing.

Dude, windows XP is super legit. You can get full source now. XP > Lunix.

CoinLenders - Bitcoin Bank Script / Demo
1v.io/kazu - 15ccW7m6RxDFWEKc3P1NdwWpX1N1pU7gZ8
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 21, 2013, 05:11:46 AM
 #25

Back up your files reinstall OS from a boot-up CD. Thats the only real way of making sure.

I thought we had to take off and nuke the whole site from orbit.  Its the only way to be sure.

Considering how valuable are these digital goods, there would be no problem in investing time and money in developing some very nasty 0 ring rootkits.
Even if you scan with an AV a harddrive as slave or from a bootable disk, it still doesn't ensure the cleanness of a drive if it wasn't on a sterile environment... ESPECIALLY if it is running Windows.

Considering the AmiBIOS source leak, accessing ring 0 would be trivial, and a BIOS Rootkit would be impossible to be cleaned up by an AV.
I would normally not worry that much, but with bitcoins a certain level of paranoia is expected.

There is no need of worrying as long as you follow very simple rules:
Ideal:
1) Nuke everything and start from zero.
2) Make a new partition and install Linux
3) Never use root
4) Use that partition only for Bitcoins and never use it for leisure browse anything.

If you are using Windows 7 (if you are still using previous version, you better kill yourself):
1) Nuke everything and start from zero.
2) Create a user with user privileges.
3) Use sandboxie for browsing, even with Chrome. Thinking of it... better sandbox everything. Sandboxie is your internet condom. Cherish it, learn to love it.
4) Use Kaspersky Antivirus. Better something than nothing.

Dude, windows XP is super legit. You can get full source now. XP > Lunix.
Either that is a joke or you are a joke.
Kaiji
Full Member
***
Offline Offline

Activity: 140
Merit: 100


Hoist the Colours


View Profile
April 23, 2013, 03:57:57 PM
 #26


Can your computer become infected with a keylogger just by clicking on a compromised website link?
w00t
Full Member
***
Offline Offline

Activity: 188
Merit: 108


View Profile
April 23, 2013, 04:15:59 PM
 #27


Can your computer become infected with a keylogger just by clicking on a compromised website link?

Theoretically yes.

First PC game is using Bitcoin as the currency: Fallout 2
▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄
Kaiji
Full Member
***
Offline Offline

Activity: 140
Merit: 100


Hoist the Colours


View Profile
April 23, 2013, 04:36:05 PM
 #28


Can your computer become infected with a keylogger just by clicking on a compromised website link?

Theoretically yes.

So does that mean it could be done but hackers don't usually use that method?
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 23, 2013, 04:53:25 PM
 #29


Can your computer become infected with a keylogger just by clicking on a compromised website link?

Theoretically yes.

So does that mean it could be done but hackers don't usually use that method?
No. It isn't just theoretically, but very practically exploited that way.
It is heavily exploited in pass-by exploits.
Either with Adobe PDF vulnerabilities, Flash, and especially Java.
w00t
Full Member
***
Offline Offline

Activity: 188
Merit: 108


View Profile
April 23, 2013, 04:59:46 PM
 #30


Can your computer become infected with a keylogger just by clicking on a compromised website link?

Theoretically yes.

So does that mean it could be done but hackers don't usually use that method?
No. It isn't just theoretically, but very practically exploited that way.
It is heavily exploited in pass-by exploits.
Either with Adobe PDF vulnerabilities, Flash, and especially Java.


Yes if you have any of those above enabled. I though more of vulnerability in the browser itself.

First PC game is using Bitcoin as the currency: Fallout 2
▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄▀▄
CRkfx1
Newbie
*
Offline Offline

Activity: 39
Merit: 0


View Profile
April 23, 2013, 05:11:24 PM
 #31


How do I ensure that my machine does not have a software key logger ? I.e. that a software key logger isn't already on my machine ?


Like others have stated, you can never be absolutely sure you're not infected, unless you're using cold storage and the container has a physical lock and is under constant trusted surveillance, even then it's not truly secure.

In the meantime, I'd recommend using an offline password manager such as http://keepass.info/.
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 23, 2013, 07:39:02 PM
 #32


Can your computer become infected with a keylogger just by clicking on a compromised website link?

Theoretically yes.

So does that mean it could be done but hackers don't usually use that method?
No. It isn't just theoretically, but very practically exploited that way.
It is heavily exploited in pass-by exploits.
Either with Adobe PDF vulnerabilities, Flash, and especially Java.


Yes if you have any of those above enabled. I though more of vulnerability in the browser itself.

Which are also exploited with 0day exploits, even for Chrome.
There is nothing theoretical about that.
If you want to browse securely use Sandboxie, that's your internet condom.
jdbtracker
Hero Member
*****
Offline Offline

Activity: 727
Merit: 500


Minimum Effort/Maximum effect


View Profile
April 23, 2013, 07:55:43 PM
 #33

What about using it in a virtual environment? It is a secure sterile environment with controllable variables, I've read up on it since I have a lot of dangerous programs on my computer, to test them they have to be run in a Virtual Environment for security and monitoring purposes, it could work for the Bitcoin wallet as well.

Does anyone know any drawbacks to this method? because if they are using a hardware Keylogger or maybe it's one of those keyloggers that uses the tilt sensor to decipher keys pressed on a smart phone, it is not going to be very effective.


If you think my efforts are worth something; I'll keep on keeping on.
I don't believe in IQ, only in Determination.
bitsalame
Donator
Hero Member
*
Offline Offline

Activity: 714
Merit: 510


Preaching the gospel of Satoshi


View Profile
April 23, 2013, 08:26:01 PM
 #34

What about using it in a virtual environment? It is a secure sterile environment with controllable variables, I've read up on it since I have a lot of dangerous programs on my computer, to test them they have to be run in a Virtual Environment for security and monitoring purposes, it could work for the Bitcoin wallet as well.

Does anyone know any drawbacks to this method? because if they are using a hardware Keylogger or maybe it's one of those keyloggers that uses the tilt sensor to decipher keys pressed on a smart phone, it is not going to be very effective.


I would propose the inverse, use the virtual environment for browsing and anything network related.
In the real operating system use the client with USER privileges, either you use Windows or Linux.
Pages: 1 2 [All]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!