S. M. Nasution, Yudha Purwanto, Agus Virgono, M. Tambunan
{"title":"Integration of autonomous sender for hidden log data on kleptoware for supporting physical penetration testing","authors":"S. M. Nasution, Yudha Purwanto, Agus Virgono, M. Tambunan","doi":"10.1109/ICWT.2015.7449205","DOIUrl":null,"url":null,"abstract":"Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing that attached to our computer. Kleptoware is one of the solutions to hardware keylogger main problem. Another problem comes when we want to take all data had been capture on the device, we must take the keylogger first. This paper discuss about how to gain data from a kleptoware autonomously with client-server design on a local area network. Result in this paper shows that data must be send at least had same file size with the buffer that already determine first.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 1st International Conference on Wireless and Telematics (ICWT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWT.2015.7449205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing that attached to our computer. Kleptoware is one of the solutions to hardware keylogger main problem. Another problem comes when we want to take all data had been capture on the device, we must take the keylogger first. This paper discuss about how to gain data from a kleptoware autonomously with client-server design on a local area network. Result in this paper shows that data must be send at least had same file size with the buffer that already determine first.