- Oct 30, 2015
- 1,251
But those HMPA mitigations...
If you read my above, I'm particularly mentioning on keylogging protection feature. While it's free on HMP.A it applies only to browser. Which is why I opt for keyscrambler Pro.
But those HMPA mitigations...
You don't need to pay for HMP.A keystroke encryption.Why pay for annual subscription on HMP.A when I can pay only once for Keyscrambler?
I'm a cheapskate person.
Ummm, no, your wrong, HMPA protects against online, offline and "added Apps" with it's keystroke encryption.If you read my above, I'm particularly mentioning on keylogging protection feature. While it's free on HMP.A it applies only to browser. Which is why I opt for keyscrambler Pro.
Yes...I agree...there is no better option.You can buy stand alone encryption from SpyShelter now
its called SpyShelter Silent
What's that browser that protects you agains all keyloggers?Keyscrambler(free version) is good only for the Browser! useless... I don't need it because already using a Next-gen browser that protects me against all kind of keyloggers:notworthy:Ghostpress is the best choice for free!
Yandex beta!! it will alert(Has hips) if something wants to access Yandex processes, user profiles, and other places such as history, cookies, keyboard and the browser screen!XD the future is hereWhat's that browser
Does KeyScrambler protects against form-grabber keyloggers, javascript-based keyloggers, browser add-on/extension keyloggers and web-based keyloggers?Keystroke encryption = Keyscrambler, that is it; they do it at system level.
I can understand why this is looked at in a positive way but do you really think it is all positive? If the browser has its own HIPS then this is a worry because security features like HIPS rely on redirecting execution flow for other running software to control them. This can lead to multiple scenarios.Yandex beta!! it will alert(Has hips)
keyscrambler doesn't block any of them, it just encrypts keystrokes, so unless the attacker knows a way to decrypt the datas logged, he can't read them.Does KeyScrambler protects against form-grabber keyloggers, javascript-based keyloggers, browser add-on/extension keyloggers and web-based keyloggers?
If I have ZAL and KeyScrambler who does the keystroke encryption?keyscrambler doesn't block any of them, it just encrypts keystrokes, so unless the attacker knows a way to decrypt the datas logged, he can't read them.
If you have security software which can protect the browser processes (memory) and/or sandbox the browser, you'll probably be protected from banking malware which may inject code for web-Inject/form-grabber functionality.form-grabber keyloggers
If you have security software which can protect the browser processes (memory) and/or sandbox the browser, you'll probably be protected from banking malware which may inject code for web-Inject/form-grabber functionality.
I doubt a sandbox can prevent form-grabber keyloggersIf you have security software which can protect the browser processes (memory) and/or sandbox the browser, you'll probably be protected from banking malware which may inject code for web-Inject/form-grabber functionality.
I'm talking about software-based ones.I doubt a sandbox can prevent form-grabber keyloggers
Agree like SBIE or any virtualization software for that matter? The reason being these javascript-based keyloggers and add-on/extension keyloggers are part of your browser. By trusting your browser you are trusting these keyloggers, no? Can you trust the browser without trusting the add-on/extension or javascript-based keyloggers?I'm talking about software-based ones.
If you're talking about software-based form-grabbers then a good sandbox should be beneficial in some scenarios. For example, the sandboxed process is restricted from being accessed by other Host processes, preventing code injection which in itself prevents networking-related APIs from being patched in memory to log credentials (e.g. Internet Explorer -> wininet.dll -> which is an example of one of the things that the Zeus banking malware does).Agree like SBIE?
I'm not talking of API-based or memory-injection keyloggers. I'm talking of form-grabbing, web-based and add-on/extension type keyloggersIf you're talking about software-based form-grabbers then a good sandbox should be beneficial in some scenarios. For example, the sandboxed process is restricted from being accessed by other Host processes, preventing code injection which in itself prevents networking-related APIs from being hooked to log credentials (e.g. Internet Explorer -> wininet.dll -> which is an example of one of the things that the Zeus banking malware does).
Your original post I quoted is below.I'm not talking of API-based or memory-injection keyloggers. I'm talking of form-grabbing, web-based and add-on/extension type keyloggers
The types of keyloggers are described here
Does KeyScrambler protects against form-grabber keyloggers, javascript-based keyloggers, browser add-on/extension keyloggers and web-based keyloggers?
Of course all these while I'm referring to software-based keyloggers. Hardware-based keyloggers is not a discussion subject here.Your original post I quoted is below.
The first you mentioned ("form-grabber keyloggers") can include software-based keyloggers which abuse memory for logging credentials, via code injection and redirecting execution flow of various networking APIs used among different browsers. This is why I brought up memory protection and/or sandboxing. I wasn't referring to add-on/extensions or Java-Script based keyloggers with the suggestion I brought up.
It is an easy misunderstanding because what you said can refer to different types of form-grabbing, however "form-grabbing" can be performed through software-based keyloggers, too. This is what Zeus and SpyEye banking malware does, targeting banking websites for credential theft.
The first thing you could try is blocking unauthorised JavaScript, there are extensions for doing things like this. However it can also break web-page functionality... Some JavaScript keyloggers will basically monitor the document for key-press events, and then they'll convert the character code to a readable string to make sense of the logged key-stroke. There's a documented API for this conversion: JavaScript String fromCharCode() MethodJavascript-based keyloggers
Its 'Protection against keystroke logging' feature encrypts the user's keystrokes so that data is unreadable even if stolen. Read somewhere ZAL also scrambles besides encrypting keystrokesZAL doesn't "do" keystroke encryption, you can verify by downloading it. I did a few days ago cuz I was doing an anti-keylogger software test, I turned on both the real time protection and the ID Theft protection or w/e it was called thing, just to be sure, then I used the Anti-Keylogger test tool from Lists of freeware antikeyloggers which has 7 different functions to monitor keystrokes with, all 7 succeeded, I tested a few chrome banking sites as well as dashlane. For comparison, when you turn on Kaspersky's Secure Keyboard Input, which is different than the Virtual Keyboard, whenever you enter a banking site and type something into a field from the site, the keylogger doesn't get anything, not even encrypted symbols. Writing anything into anywhere else, including the address bar, does get revealed, which is how kaspersky's supposed to work. Not sure if I did something wrong with ZAL but what is there to do wrong? I allowed literally everything when installing ZAL, I checked for updates, I added it to the trusted applications and firewall as well. ZAL didn't even detect the antikeylogger tool when I turned the real time protection on, kaspersky did. I didn't scan it with ZAL tho, but it certainly didn't encrypt any keystrokes at all