03.03.2013 Views

Issues in Computer Forensics

Issues in Computer Forensics

Issues in Computer Forensics

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

It is because of these and other complications that can br<strong>in</strong>g the hunt to a<br />

screech<strong>in</strong>g halt. The best that can be done is to do the best we can to restore the services,<br />

learn from past mistakes, consistently update system security patches and to stay vigilant.<br />

Keystroke Loggers<br />

Keystroke loggers run primarily <strong>in</strong> the background of a computer and many run <strong>in</strong><br />

“stealth” mode, mean<strong>in</strong>g they are not listed <strong>in</strong> process lists and hide the registry<br />

modifications it makes to system sett<strong>in</strong>gs. Once each key is <strong>in</strong>tercepted, the <strong>in</strong>formation<br />

may be stored somewhere on the computer (or a remote computer) to be accessed later or<br />

streamed, <strong>in</strong> real-time, over the network to the person who started the logg<strong>in</strong>g program.<br />

Keystroke loggers have become more advanced and now are capable of features<br />

such as notification for the logger’s <strong>in</strong>itiator when specific behavior or content is<br />

encountered and can even record screenshots of anyth<strong>in</strong>g that is displayed on the monitor<br />

at any particular event or at regular time <strong>in</strong>tervals, allow<strong>in</strong>g key loggers to become even<br />

more <strong>in</strong>trusive.<br />

A key logger normally consists of two parts: a Dynamic-L<strong>in</strong>k Library (DLL) file<br />

that performs the logg<strong>in</strong>g, and an executable (EXE) file that loads the DLL and sets the<br />

hook onto the keyboard 28 . A hook is def<strong>in</strong>ed as any mechanism that uses a function to<br />

<strong>in</strong>tercept events before they can reach an application. The function can then change,<br />

manipulate, or discard (keyboard) events <strong>in</strong> any way before allow<strong>in</strong>g them through to the<br />

dest<strong>in</strong>ation application. Hooks come <strong>in</strong> two flavors: system-wide and thread-specific; key<br />

loggers use system-wide hooks. DLLs are files that conta<strong>in</strong> functions (as well as other<br />

<strong>in</strong>formation) that can be l<strong>in</strong>ked to any application at run-time. When this is done, the<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!