TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How I Cracked a Keylogger and Ended Up in Someone's Inbox

468 点作者 Spydar007将近 9 年前

17 条评论

lossolo将近 9 年前
Website that we were running was under DDOS couple of years ago, what we did is we took ips of servers that made ddos. Then we scanned the ports, found vulnerability in the application that was running on it then get into the server using this vulnerability. We checked open connections and found one used for command and control server (irc server) then we listened to irc channel. DDOSers were talking private things on that channel... Then we entered their channel and disabled all their bots using their own software that we got source from link pasted on their channel. Then we confronted them, period of silence after they have read what we wrote was priceless. They never ddosed us again.
评论 #12023802 未加载
评论 #12023663 未加载
评论 #12023737 未加载
评论 #12023673 未加载
评论 #12023625 未加载
评论 #12025839 未加载
评论 #12024403 未加载
gesman将近 9 年前
Thanks to domaintools.com - I also found that the guy (seemaexports3@gmail.com) used to own domain: bdmtsteel.com<p>I also find similarities between above domain and these: transitoin-asia.com seabunker.net<p>See this: <a href="http:&#x2F;&#x2F;imgur.com&#x2F;tsxqwiQ" rel="nofollow">http:&#x2F;&#x2F;imgur.com&#x2F;tsxqwiQ</a><p>If someone wants to do more research - would be fun to dig deeper.
评论 #12024157 未加载
popey456963将近 9 年前
Is the header sticky for anyone else? It seems to take up ~30% of my screen (Windows 7, Chrome Stable) [0].<p>[0] <a href="http:&#x2F;&#x2F;puu.sh&#x2F;pNYUH&#x2F;d42d8395fc.jpg" rel="nofollow">http:&#x2F;&#x2F;puu.sh&#x2F;pNYUH&#x2F;d42d8395fc.jpg</a>
评论 #12023615 未加载
评论 #12023594 未加载
评论 #12023491 未加载
评论 #12023873 未加载
评论 #12024012 未加载
评论 #12023513 未加载
评论 #12023659 未加载
vmp将近 9 年前
I&#x27;ve done this a few times for fun, simply search YouTube for a &quot;game code generator&quot; or something like that, take your pick, download their magic &quot;tool&quot; from the link in the video description and get disassembling with ILSpy [1]. A ton of these &quot;account stealers&quot; are written in VB.NET and seem to be generated from a template. Remember to stay safe and use a sandbox or virtual machine when dealing with malicious code.<p>[1] <a href="http:&#x2F;&#x2F;ilspy.net&#x2F;" rel="nofollow">http:&#x2F;&#x2F;ilspy.net&#x2F;</a>
评论 #12025984 未加载
libeclipse将近 9 年前
Aha I love those little messages at the end telling users to update their software to the latest version. It&#x27;s a cry to the void.
评论 #12023882 未加载
piqufoh将近 9 年前
That&#x27;s a great little story, interesting to read how these sorts of scams are carried out, but I also found the code analysis and decompilation tale fun!
评论 #12023546 未加载
评论 #12023757 未加载
unknown2374将近 9 年前
I just hope someday the general public realize what a poor job Microsoft has done regarding security on Windows operating systems and embrace other (and more promising) alternatives
评论 #12023620 未加载
matt_wulfeck将近 9 年前
&gt; It also attempts to steal password manager credentials and Windows keys.<p>Ugh I hate reading this. I keep everything in my password manager. If I lose that I&#x27;m hosed. I wish more sites supported 2FA.
评论 #12024004 未加载
jacquesm将近 9 年前
Scary that a vulnerability that old is still worth exploiting.
评论 #12023506 未加载
nchelluri将近 9 年前
a few questions I&#x27;m wondering about, if anyone can help:<p>- how do those PW stealers work? are they similar to the Steam one, where it&#x27;d delete existing creds and then sniff newly entered ones?<p>- can this thing detect certain apps like FileZilla and then say &quot;user entered &lt;FTP site creds&gt;&quot; and send individual fields, and is that what is meant by supporting say FTP and FileZilla?<p>- what does PHP support mean? maybe looks for common stuff like php.ini, various other conf files like FPM, and tries to find DB&#x2F;cache connection creds?<p>there&#x27;s one other thing I&#x27;m wondering about, which is the light&#x2F;easily crackable encryption of the keylogger&#x27;s internals, and I vaguely remember reading about Google&#x27;s encryption on the new recaptcha and people talking about all this stuff like complicated encryption routines baked into the client side JS that I really didn&#x27;t understand except at a handwavy level, and wonder if that&#x27;s the kind of thing some, say, intelligence&#x2F;espionage outfit could use.<p>very interesting&#x2F;engaging (fun) article, all in all, for me. and I appreciated the understatement of the (well-deserved) plug at the end.
评论 #12023697 未加载
评论 #12023658 未加载
评论 #12024154 未加载
评论 #12025552 未加载
gruez将近 9 年前
I&#x27;m surprised the .net executable wasn&#x27;t obfuscated (as they usually are)
Koahku将近 9 年前
Using Volafile to host the keylogger executable seems like a pretty bad choice considering that this website will delete your files after only 2 days. Or maybe this shouldn&#x27;t surprise me so much considering the &quot;skills&quot; of the attacker.
评论 #12023930 未加载
heisenburgzero将近 9 年前
where did ).exe came from? I thought you need to use VBscript of some sort to download a file from command line.
Zhycrin将近 9 年前
10&#x2F;10 brilliant. If only i was smart enough to do this...
Zhycrin将近 9 年前
Actually, this is interesting.
darekdk将近 9 年前
Fantastic write up! Good work.
ascotan将近 9 年前
Nice writeup.