<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.yobi.be/index.php?action=history&amp;feed=atom&amp;title=Keyloggers</id>
	<title>Keyloggers - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.yobi.be/index.php?action=history&amp;feed=atom&amp;title=Keyloggers"/>
	<link rel="alternate" type="text/html" href="https://wiki.yobi.be/index.php?title=Keyloggers&amp;action=history"/>
	<updated>2026-05-23T21:45:39Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://wiki.yobi.be/index.php?title=Keyloggers&amp;diff=2640&amp;oldid=prev</id>
		<title>PhilippeTeuwen at 21:18, 8 February 2008</title>
		<link rel="alternate" type="text/html" href="https://wiki.yobi.be/index.php?title=Keyloggers&amp;diff=2640&amp;oldid=prev"/>
		<updated>2008-02-08T21:18:10Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==lkl==&lt;br /&gt;
 apt-cache search keylog&lt;br /&gt;
 lkl - userspace keylogger for x86 architecture&lt;br /&gt;
&lt;br /&gt;
 lkl -l -k /usr/share/lkl/keymaps/us_km -o /tmp/log.file&lt;br /&gt;
=&amp;gt; Eats 100% of my CPU, half in syscalls, pfff what a discreet piece of soft, and leaves the keyboard in a dirty state, like ctrl was always pushed down&lt;br /&gt;
&lt;br /&gt;
I submitted [http://bugs.debian.org/460230 a patch] to solve the problem and [http://bugs.debian.org/464757 another one] to get -h working without having to be root.&lt;br /&gt;
&lt;br /&gt;
==lkm==&lt;br /&gt;
http://packetstormsecurity.org/UNIX/security/kernel.keylogger.txt&lt;br /&gt;
&amp;lt;br&amp;gt;Hijacks the syscall table&lt;br /&gt;
 original_read = sys_call_table[ SYS_read ];                                                                                                                                                                                                                           &lt;br /&gt;
 sys_call_table[ SYS_read ] = hacked_read; &lt;br /&gt;
Logs all sys_read() from stdin (0) with one byte read&lt;br /&gt;
&amp;lt;br&amp;gt;Doesn&amp;#039;t hide itself&lt;br /&gt;
&amp;lt;br&amp;gt;Code done for old kernels, 2.4.5...&lt;br /&gt;
==vlogger==&lt;br /&gt;
http://www.phrack.org/issues.html?issue=59&amp;amp;id=14&amp;amp;mode=txt&lt;br /&gt;
&amp;lt;br&amp;gt;Hijacks the syscall table, not on the sys_read() which is solicited quite a lot but on the open() to monitor ttys and hijack their receive_buf() function which is called by the low-level tty driver to send characters received by the hardware to the line discipline for processing&lt;br /&gt;
&amp;lt;br&amp;gt;Code done for old kernels, 2.4.18...&lt;br /&gt;
==tcleo==&lt;br /&gt;
brought to you by the Argentine government :-)&lt;br /&gt;
&amp;lt;br&amp;gt;http://www.citefa.gov.ar/SitioSI6_EN/si6.htm&lt;br /&gt;
&amp;lt;br&amp;gt;Supports kernels up to 2.6.5 :-(&lt;br /&gt;
&amp;lt;br&amp;gt;Apparently was part of Honeynet project so maybe it&amp;#039;s just ancestor of sebek...&lt;br /&gt;
&lt;br /&gt;
==sebek==&lt;br /&gt;
part of the honeynet project&lt;br /&gt;
&amp;lt;br&amp;gt;http://www.honeynet.org/tools/sebek/&lt;br /&gt;
&amp;lt;br&amp;gt;kernel module, hides itself and hides its own network traffic&lt;br /&gt;
&amp;lt;br&amp;gt;same syscall table hijacking, monitors read, readv, pread64, open, socketcall, fork, vfork, clone&lt;br /&gt;
&amp;lt;br&amp;gt;filtering capabilities&lt;br /&gt;
&amp;lt;br&amp;gt;can sniff keystrokes but also uploaded files etc&lt;br /&gt;
&amp;lt;br&amp;gt;sends data to a remote server&lt;/div&gt;</summary>
		<author><name>PhilippeTeuwen</name></author>
	</entry>
</feed>