Local Host

Level 22
Verified
So firewall is not optimum solution although it may prevent the data breach but will not detect the infection occured
Has keyloggers has some symptoms which may trigger certain AV module ?? And if which part 🤔🤔 ??
You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.

Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.
 
F

ForgottenSeer 85911

You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.

Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.
none of what you posted here is correct
there are ample cases where keylogging is done in ways that AV does not detect, powershell or wmic is a good place to start
no administrative permissions needed on Windows
no exploit required
 

ichito

Level 9
Verified
Content Creator
Hmm...it 's repeted in some other places...int this forum also...that detection of some logger actions...not only key-logger...means that our defence is bypassed and next...in consequences...our plan/idea of builded security is invalid. I assume that such opinion is based on detection offered by AV/IS apps and its all featured that working on every possible black/block lists and signatures of AV engines...and that's why can't agree with it. AV is not the beginning and the end of security that we can have and there are a lot of others technolgies that can give us much more...that are a bit further from common apps but still can protect without bad effects.
 

ichito

Level 9
Verified
Content Creator
You can look at some examples of below...a lot of info about malware
but about legal apliacation also
 

DDE_Server

Level 21
Verified
You can look at some examples of below...a lot of info about malware
but about legal apliacation also
Thanks a lot for the links @ichito i will take a look on them to gain more understanding
 
Top