aboutsummaryrefslogtreecommitdiff
path: root/README
blob: 684a29c7a85773af6eb1365bf5f92d10fa95636d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
Evspy is a general purpose kernel-mode keylogger in (early) development stage.

The file from where you can read the registered keystrokes is /proc/driver/evspy
by default. Only root can read it. Beware users: evspy can troll you.

Don't be evil.


** COMPILE **
	$ make


** LOAD **
	# insmod evspy.ko


** UNLOAD **
	# rmmod evspy


** IS IT ALREADY LOADED? **
	$ lsmod | grep evspy


** PERSISTENCE **

If you want evspy to be loaded every time system boots, copy it into your
kernel module dir:
	# cp evspy.ko /lib/modules/$(uname -r)/kernel/drivers/input/evspy.ko

and update module database:
	# depmod -a

(In some distros it could also be necessary to add it to some rc/config file)

Once it has been installed, you can load it when you want with
	# modprobe evspy


** OTHER **

A patch is supplied (evspy.patch) to be able to compile a kernel with evspy
included. If KERN is the directory where your kernel is located, just copy the
patch there (KERN/) and copy all the evspy files (*.c, *.h, maps, khm) to
KERN/drivers/input/. Then, cd to KERN and apply the patch:
	$ patch -p1 < evspy.patch

Then you should be able to configure the kernel to include evspy just like
any other module:
	$ make menuconfig
		Device Drivers --> Input device support --> Event based keylogger
	$ ...