
he wants stuxnet :D *Humphrey Kebaya Mwamba* *FX,Futures and Commodities Trader* *| On A Righteous Path |* My profiles: [image: Facebook] <http://www.facebook.com/kebaya> [image: Twitter] <http://twitter.com/humphreykebaya> Contact me: [image: Google Talk/] humphreykebaya@gmail.com [image: Skype/]kebaya.mwamba [image: Y! messenger/] kebayamwamba@yahoo.com IMPORTANT: The contents of this email and any attachments are confidential. They are intended for the named recipient(s) only. If you have received this email by mistake, please notify the sender immediately and do not disclose the contents to anyone or make copies thereof. Signature powered by <http://www.wisestamp.com/email-install?utm_source=extension&utm_medium=email&utm_campaign=footer> WiseStamp<http://www.wisestamp.com/email-install?utm_source=extension&utm_medium=email&utm_campaign=footer> On 8 March 2011 10:38, Timothy Mutugi <timothymutugi@gmail.com> wrote:
"Penetration Tester" ????
On 3/7/11, Gichuki John Chuksjonia <chuksjonia@gmail.com> wrote:
Hi Eric.
Hardware keyloggers are a little different form software Keyloggers as far readers are concerned. First of all the hardware keyloggers in your possession, is it remotely controlled via wireless/radio connection? Have u tried to intercept? Is it dumping internally or remotely?
Secondly, if the keylogger is found on a machine that is under investigation etc, did you plug it out or pulled the machine of the network.
The reasons am asking these question is due to the following facts, since i had some experience in Europe with a Red Team Assessment, and keyloggers were used.
1. The keylogger could be dumping logs to a remote machine via wireless or bluetooth. 2. Is the log file encrypted and on what algorithm? 3. The logs can be seen on Linux computers as long us mounted properly with the right modules. You just need an editor. 4. Were the right procedures to seize the keylogger used. This is course if it was just plugged out, you may have lost the data or simply wiped it. Did you try get fingerprints, or forensically determined the date it was plugged in?
In short you don't need a reader, you just need a better procedure to read it.
Kind regards,
./Chucks
On 3/4/11, Eric Mugo <kabugum@gmail.com> wrote:
Hi all,
I'm looking for hardware keyloggers (serial/USB) and their readers to purchase. Anyone out there with the stuff and at how much. Also can anyone provide me with a reader so i can try pull out content that maybe stored in a USB keylogger i have in my possession.
Regards, Eric M.
-- -- Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P I.T Security Analyst and Penetration Tester jgichuki at inbox d0t com
{FORUM}http://lists.my.co.ke/pipermail/security/ http://chuksjonia.blogspot.com/ _______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke
_______________________________________________ Skunkworks mailing list Skunkworks@lists.my.co.ke http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks ------------ Skunkworks Rules http://my.co.ke/phpbb/viewtopic.php?f=24&t=94 ------------ Other services @ http://my.co.ke