Keylogging internet cafes

BoxBox Regular
edited July 2011 in Man Cave
A friend of mine got the idea of doing this in hope that he may get some sensitive PI and possibly purchase items and have them dropped off to another house. However, he's new to this sort of stuff.

What keylogger would be recommended for such task? Could the logs be mailed to a server or would he have to use a USB flash drive for every single computer and come back at a later time to copy the logs? What's the difference between a hardware keylogger and a software keylogger? Both log keystrokes; is there a benefit to a hardware keylogger?

Comments

  • RemadERemadE Global Moderator
    edited June 2011
    I used to use Ardamax. You can customise it almost entirely. However most Antivirus programs will sniff it out as soon as you put your pen drive in now.

    Best bet would be to try and program one from scratch. Plenty of tutorials around there.
  • CaptainFalconCaptainFalcon Regular
    edited June 2011
    don't. If it's a software one, it'll swiftly be removed, and if it's a hardware one, you're pretty much fucked after one week, when they do maintenance. It would be better to position some sort of visual skimmer, like a nice high quality, high FPS camera, but modded so the lens and sensor can protrude from the harddrive it's storing to.

    Software keyloggers are always easily rooted out.

    Hardware keyloggers generally have one rule: the harder it is to install, the harder it is to find. Generally, unless you can get quite, uninterrupted access to the computers, don't do either, it's a stupid idea.
  • BoxBox Regular
    edited June 2011
    Ardamax seems the most popular and there's a cracked version. He'll look into testing it.

    And it would be impossible to setup a camera. The location is an internet cafe and is monitored.

    The cafe uses cleanslate so the PCs have no antivirus software installed. One thing that worried my friend is that cafes use internet cafe monitoring devices in order to set the time and what not. Which means that the owner/manager will see (if he's nosy) the client's screen in real-time from his server.
  • DfgDfg Admin
    edited June 2011
    Actually, it's pretty simple. Most Internet Cafe in Pakistan are shit. Hmm, I should make another for it and get the project rolling.
  • CaptainFalconCaptainFalcon Regular
    edited June 2011
    If it's monitored, hardware keyloggers = instant assrape for you. Software, unless it's quick and you're lucky, would be better, but for the risk vs the personal info of people who can't even afford a PC and internet, there's far better things you could be doing.
  • edited June 2011
    Firstly, if you're at an internet cafe then forget keylogging for a second. Look into MITM (Man In The Middle) attacks. Using a few tools for linux, you can literally sit in between someone's computer and the Wireless router, capturing packets and then forwarding them to the router. No one would be wise of what you were doing.

    Using MITM attacks, you can log people's usernames and passwords to websites which they log into, which is where you'd get your personal information that you're looking for.

    Another option would be to take your laptop to the internet cafe and start looking for vulnerable machines. If you can hack into one of them, you can get a shell and start logging keystrokes.
  • BoxBox Regular
    edited June 2011
    The cafe is hardwired network and the only available wireless network is passlocked using WPA2. What my buddy was thinking about doing was browsing regularly for 5 minutes then booting the keylogger from a flash. Then he'd come back several hours laters and rent out the same computer. Given that the computer isn't rebooted, the logs should remain.

    Can this man in the middle attack be done via lan?
  • edited June 2011
    MITM attacks can be done over LAN, yeah. Your keylogger idea sounds good though, just make sure it's fully undetectable and you should be alright. Set it up to email you the logs every once in a while.
  • BoxBox Regular
    edited June 2011
    Implanted. Set the log delivery to email every 5 mins.
  • edited June 2011
    Did you end up using a software keylogger in the end? Has it farmed anything useful?
  • BoxBox Regular
    edited June 2011
    He ended up getting some hotmail passes and some hardcore indian porn site login. Nothing spectacular.
  • edited June 2011
    Don't any of those email addresses have accounts tied to them? Perhaps some of them use the same passwords, or you can reset the passwords to the accounts to take them over? Fun can still be had...
  • CaptainFalconCaptainFalcon Regular
    edited June 2011
    FFS, these are people who don't even own fucking PCs, what could you possibly gain from getting their personal info? Try something more lucrative, dumbass.
  • WhiteMagicManWhiteMagicMan New Arrival
    edited June 2011
    Re: MITM - any good sites will be SSL (like a bank), so you won't get any info this way. Not many people do their banking from an internet cafe. Try the software keylogger, you can find one that's not yet detectable by AVS (or modify one). Hardware logger is riskier cuz you have to come back to pick it up, if it was found in the meantime, they could be waiting for you - not to mention, someone else could find it and pocket it. That's money out of your pocket.
  • PsychotogenPsychotogen Regular
    edited June 2011
    you fucking people are the reason it's so hard to get a replacment drivers licence.. thanks a lot asswipes
  • edited June 2011
    Re: MITM - any good sites will be SSL (like a bank), so you won't get any info this way. Not many people do their banking from an internet cafe. Try the software keylogger, you can find one that's not yet detectable by AVS (or modify one). Hardware logger is riskier cuz you have to come back to pick it up, if it was found in the meantime, they could be waiting for you - not to mention, someone else could find it and pocket it. That's money out of your pocket.

    This is where a tool called SSLstrip comes in handy. You arpspoof, then fire up SSLstrip and start capturing packets. You can then remove the SSL encryption from the connection, grab the information you need and then convince the target machine that they're still using a secure connection.

    Clever shit.
  • ChupaloChupalo Regular
    edited June 2011
    trx100 wrote: »
    This is where a tool called SSLstrip comes in handy. You arpspoof, then fire up SSLstrip and start capturing packets. You can then remove the SSL encryption from the connection, grab the information you need and then convince the target machine that they're still using a secure connection.

    Clever shit.

    This is exactly why I own a laptop. I never use other people's computers.

    At least carry a small bootable linux flash drive and boot the machine with that (after checking for physical keyloggers).
  • edited June 2011
    Unfortunately, I'm not really sure how you protect yourself from a Man in the Middle attack without using SSH or something to tunnel your connection.

    Any ideas?
  • BoxBox Regular
    edited June 2011
    lol how ironic.

    Is there any reputable software that detects well known keyloggers made by Ardamax and Award? I know A/Vs are pretty shitty at picking them up. When I tested one on my pc some time ago, avast didn't do shit. Fucking shady ass internet cafes
  • ChupaloChupalo Regular
    edited June 2011
    trx100 wrote: »
    Unfortunately, I'm not really sure how you protect yourself from a Man in the Middle attack without using SSH or something to tunnel your connection.

    Any ideas?

    If SSL sessions can be intercepted, there's not much else you can do short of tunneling through a secure Internet connection. You can pretty much tunnel from everywhere, even if filtering is in place. You can tunnel over UDP 53, since DNS is always allowed - it's slow but it works.

    I know a lot of people going back to telephone banking, simply for security reasons. Shit, even fax machines are a hell of a lot more secure than email.

    I often wonder about TOR - I'm sure there is plenty of packet inspection going on by not-so-honest people setting up relays. Unless I'm mistaken about TOR works, what's to stop them from intercepting any session?
  • DaSkipperDaSkipper Regular
    edited June 2011
    Use a RAT. I suggest Poison Ivy. Crypt that and install it on the computers. You can then upload the keylogger to the computer via Poison Ivy. Of course remove all anti-virus or crypt it and re-crypting it everytime. Seriously just use http://hackforums.net Its quite helpful. I got 4400 passwords from 4chan alone, I know what I'm talking about.
  • PacoPaco me administrator
    edited July 2011
    DaSkipper's idea is my favorite. RAT's can be tons of fun. Hell, if you get bored of keylogging I know Cerberus has a "Fun Stuff" Section where you can control the Disk Drive and shit. Imagine the luls that could be had.
Sign In or Register to comment.