![]() You will need to install scapy to run this. Sniff(filter="tcp and port 24800", prn=querysniff, store=0) Here is a few lines of python that will do just that: from scapy.all import * Assuming you have Man-In-The-Middle between a client and server, are on a network using a hub, receiving traffic from a span port, or otherwise have a pcap of the traffic, extracting keystrokes is quite simple. The first thing most warned about is eavesdropping on keystrokes, which often times will contain sensitive information to include passwords. My research didn’t turn up much, only one security researcher discussing a crypto fail in an older version of Pro, and forum threads of a few cautious power users. I was curious about the risk posed by using this software without any additional steps taken to secure the communication channel. Symless, the company that develops the Synergy acknowledges the risk of using the un-encrypted version, and suggests to either buy the Pro version, or encapsulate the Synergy traffic within an SSH tunnel. They are almost identical, but the Pro version supports SSL encryption. Synergy has two main pricing tiers, Basic, and Pro. The clients initiate connections to the server to allow that server to send commands to them, such as moving the mouse, using the keyboard, or accessing the clipboard. The way this works is one host acts as the Synergy server, and the other hosts act as Synergy clients. Below is a YouTube video from Synergy on how it works: When configured, moving your mouse off the screen will allow you to control another system that is also set up with Synergy. Synergy is a type of mouse an keyboard sharing software.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |