Penetration Testing mailing list archives

Re: Keystroke logging


From: "Kurt Keys" <KKeys () sddpc org>
Date: Fri, 01 Jul 2005 07:44:32 -0700

Instead of a Keystroke logger, setup a proxy for your pen-test systems to use
on their outbound connection to the target. Then have the proxy log everything
and although you may not have all the mouse clicks and commands typed, you 
will have a log of the traffic to and from the target network. To me that is infinitely
more valuable. But that's just me.
Good Luck,

Kurt Keys
Information Security Specialist
Information Security Department
San Diego DPC


"JB" <pentest () jitonline net> 6/30/2005 12:36:24 PM >>>
I'm wondering if anyone has either a kernel level keystroke logger for the
Linux 2.6, or a userspace keystroke logger for Linux. As part of our
penetration testing, we are required to give the client a log of all
actions performed - so this would be a good way of logging all linux
commands. Also - if you know of the same sort of tool for windows - that
would also be appreciated.

-J





Current thread: