is this legal? You have to make it legal, using the Penetration Testing contracts provided just need to add a clause that allows you to use social engineering tactics that include keylogging devices, USB sticks and other peripheral devices as part of the test. Almost always I am permitted to do so because it proves a huge weakness with user security awareness. I simply act professional and tell the employee I’m doing an upgrade, replacing their keyboard (not needed, just got the stick on there – takes two seconds) or some other type of maintenance or service.
KeyGhost USB Keyloggers work by recording USB traffic in hardware. There is no software to install to record or retrieve keystrokes on PC or Mac.
– Easy to use, just plug KeyGhost to your keyboard and record all USB keystrokes typed on that keyboard. Can be connected regardless whether PC is turned on or off.
– KeyGhost devices are portable. Keystrokes can be recorded on one computer and retrieved on another.
– If a USB keyboard works when you plug it to your computer then KeyGhost will also work when attached to that keyboard. KeyGhost will record all keystrokes regardless of whether it is connected between the keyboard and PC, Mac or an external HUB.
– All keystrokes typed will be quietly recorded to KeyGhost’s internal flash memory chip (up to 2,000,000 keystrokes with 128-bit encryption)!
– KeyGhost USB Keyloggers are compatible with all PC and Mac operating systems that run on a PC or Mac. I.E. They are compatible with Windows 98SE, ME, NT, XP, 2000, Vista, Linux, DOS, OS/2, Mac OS X Tiger, Leopard etc.
– The KeyGhost USB Keylogger uses the generic HID keyboard device drivers and USB composite device drivers built into all operating systems that support USB keyboards.
– There is no USB ‘enumeration’ alert when you log into your KeyGhost device,… the ‘Ghost’ menu appears instantly and silently!
– The KeyGhost USB keylogger devices will even record keystrokes typed on older USB keyboards running at low speed (1.1Mbps) and newer (higher-speed) full speed (12Mbps) USB keyboards such as the Mac keyboards.
– KeyGhost USB Keylogger will also work with Wireless keyboards when attached between the receiver and the PC or HUB. See important update regarding (wireless) Logitech BT keyboards below*
*Important update regarding Logitech Unified BT keyboards: Our KeyGhost devices will only work with wireless keyboards that come with their own receiver that emulates a standard USB keyboard (or composite USB HID). Usually these receivers are larger in size, as they contain the electronics required for standard USB Composite HID emulation. KeyGhost devices will not work with the new Logitech BT keyboards, which use a Unified (or generic) BT receiver (for combined use), rather than a dedicated USB keyboard emulator. If you are unsure about the receiver which comes with your wireless keyboard, please contact us with the model number of your keyboard prior to placing your order, and we will let you know if your wireless keyboard will be compatible with our KeyGhost USB devices.
– KeyGhost USB Keylogger instantly converts any keyboard containing an internal hub into a generic HID composite device. This means any PS/2 or USB mouse attached to the keyboard will still continue to function after the KeyGhost USB Keylogger is attached, and any additional USB devices attached to the keyboard will be disconnected when KeyGhost re-enumerates the keyboard as a generic USB composite device.
– Any built-in USB connectors on keyboards that contain an internal hub can still be used with other devices if the keyboard has 2 USB cables going to the Mac or PC, such as the USB 2.0 connectors found on the Matias USB 2.0 Keyboard (the world’s only keyboard with built-in USB 2.0 ports).