malware Posted October 21, 2018 Posted October 21, 2018 (edited) Reverse engineering a keylogger (Email based logger) is it possible to to get the email address and Password which is set to get key logs. Edited October 21, 2018 by malware
jameswoods Posted October 21, 2018 Posted October 21, 2018 Depending on how the malware operates. Alot of the time you can get the SMTP settings which will usually include a username/password
evilcry Posted October 22, 2018 Posted October 22, 2018 Not all traffic is e-mail based, this is common for quite simple and kiddish keyloggers. Usually keystrokes are sent to a C&C over HTTPS.
p4r4d0x Posted October 22, 2018 Posted October 22, 2018 7 hours ago, evilcry said: Not all traffic is e-mail based, this is common for quite simple and kiddish keyloggers. Usually keystrokes are sent to a C&C over HTTPS. Any examples???
evilcry Posted October 23, 2018 Posted October 23, 2018 6 hours ago, p4r4d0x said: Any examples??? APTs like Turla, RATs like darkcomet, pandora, dedicated keyloggers like bladabindi. https://www.fortinet.com/blog/threat-research/bladabindi-remains-a-constant-threat-by-using-dynamic-dns-services.html https://0ffset.wordpress.com/2018/10/05/post-0x17-2-turla-keylogger/ 1
MichaelD Posted October 25, 2018 Posted October 25, 2018 On 10/23/2018 at 12:08 AM, p4r4d0x said: Any examples??? Add Virobot malware, Ventir trojan etc
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now