تفاصيل الدورة
If your computer could talk, it would spill all sorts of secrets. Every day we interact with our computers through keyboards, microphones, web cameras, and similar devices and willingly input sensitive information.
This data could divulge a wealth of lucrative information you'd never want exposed to an unauthorized party.
In this course we dive into writing our own keylogger tool for surveilling the target system to extract some of this sensitive information. I won't name names, but I tested these tools against three major Windows antivirus vendors and not one reported any malicious activity taking place.
We'll utilize Python to create a tool that will collect keystroke inputs from a target Windows system. This will give any ethical hacker access to a treasure trove of valuable information.
Don't wait, discover the secrets to cyber surveillance with Python in this complete course for ethical hackers, penetration testers, system administrators or anyone with an interest in cyber security.
تحديث بتاريخ 22 February, 2018Certified Ethical Hacker (CEH) أسئلة ذات صلة
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at Laimoon1,449 درهممدة الدورة التدريبية: Upto 30 Hours
- IT Security Level 3 Course Line88 درهم
808 درهممدة الدورة التدريبية: Upto 5 Hours - IT: Ethical Hacking John Academy92 درهم
1,469 درهممدة الدورة التدريبية: Upto 6 Hours