Posted October 21, 20186 yr Reverse engineering a keylogger (Email based logger) is it possible to to get the email address and Password which is set to get key logs. Edited October 21, 20186 yr by malware
October 21, 20186 yr Depending on how the malware operates. Alot of the time you can get the SMTP settings which will usually include a username/password
October 22, 20186 yr Not all traffic is e-mail based, this is common for quite simple and kiddish keyloggers. Usually keystrokes are sent to a C&C over HTTPS.
October 22, 20186 yr 7 hours ago, evilcry said: Not all traffic is e-mail based, this is common for quite simple and kiddish keyloggers. Usually keystrokes are sent to a C&C over HTTPS. Any examples???
October 23, 20186 yr 6 hours ago, p4r4d0x said: Any examples??? APTs like Turla, RATs like darkcomet, pandora, dedicated keyloggers like bladabindi. https://www.fortinet.com/blog/threat-research/bladabindi-remains-a-constant-threat-by-using-dynamic-dns-services.html https://0ffset.wordpress.com/2018/10/05/post-0x17-2-turla-keylogger/
October 25, 20186 yr On 10/23/2018 at 12:08 AM, p4r4d0x said: Any examples??? Add Virobot malware, Ventir trojan etc
Create an account or sign in to comment