Advice Request Can malware access a keyboard's onboard memory?

Please provide comments and solutions that are helpful to the author of this topic.

Chimaira

Level 4
Thread author
Verified
Well-known
Jan 5, 2018
163
505
268
a place with snow and mountains
Could malware or windows itself gain access to a keyboard's onboard memory? Is it readable by the system?

If you stored a password as a macro on your keyboards onboard memory would it be vulnerable to malware?
 
  • Like
Reactions: XhenEd
About malware code, access the onboard memory is a very complicated if you don't have extensive knowledge of programming.

However, but this is not related to your specific question, the operating system exposes interfaces represented by the API and in general by the system calls.
As we know a keylogger can hook API like GetAsyncKeyState() for example, by reading your keystrokes, and then what you type on the keyboard
 
About malware code, access the onboard memory is a very complicated if you don't have extensive knowledge of programming.

However, but this is not related to your specific question, the operating system exposes interfaces represented by the API and in general by the system calls.
As we know a keylogger can hook API like GetAsyncKeyState() for example, by reading your keystrokes, and then what you type on the keyboard

Would this same process you've described extend to being able to read to the contents of a keyboard macro as it is executed?
 
Would this same process you've described extend to being able to read to the contents of a keyboard macro as it is executed?
Possible, some keyloggers are essentially based on Windows hook WH_KEYBOARD_LL. This hook allows you to intercept low-level keyboard event generated by the user. By specifying an appropriate callback (as RawInputKeyboard), it is possible to hijack all the keystroke to this function, register it in memory and then pass them to the operating system. The keystrokes are recorded in a buffer dynamically grows depending on the amount of data received.