تفاصيل الدورة
If your computer could talk, it would spill all sorts of secrets. Every day we interact with our computers through keyboards, microphones, web cameras, and similar devices and willingly input sensitive information.
This data could divulge a wealth of lucrative information you'd never want exposed to an unauthorized party.
In this course we dive into writing our own keylogger tool for surveilling the target system to extract some of this sensitive information. I won't name names, but I tested these tools against three major Windows antivirus vendors and not one reported any malicious activity taking place.
We'll utilize Python to create a tool that will collect keystroke inputs from a target Windows system. This will give any ethical hacker access to a treasure trove of valuable information.
Don't wait, discover the secrets to cyber surveillance with Python in this complete course for ethical hackers, penetration testers, system administrators or anyone with an interest in cyber security.
تحديث بتاريخ 22 February, 2018Certified Ethical Hacker (CEH) أسئلة ذات صلة
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at Laimoon1,449 درهممدة الدورة التدريبية: Upto 30 Hours
- Level-3 Ethical USB Hacking Course Cloud55 درهم
1,249 درهممدة الدورة التدريبية: Upto 1 Hour - IT Security & Ethical Hacking Course Central83 درهم
551 درهممدة الدورة التدريبية: Upto 11 Hours