تفاصيل الدورة

If your computer could talk, it would spill all sorts of secrets. Every day we interact with our computers through keyboardsmicrophonesweb cameras, and similar devices and willingly input sensitive information.

This data could divulge a wealth of lucrative information you'd never want exposed to an unauthorized party.

In this course we dive into writing our own keylogger tool for surveilling the target system to extract some of this sensitive information. I won't name names, but I tested these tools against three major Windows antivirus vendors and not one reported any malicious activity taking place.

We'll utilize Python to create a tool that will collect keystroke inputs from a target Windows system. This will give any ethical hacker access to a treasure trove of valuable information.

Don't wait, discover the secrets to cyber surveillance with Python in this complete course for ethical hackerspenetration testerssystem administrators or anyone with an interest in cyber security.

تحديث بتاريخ 22 February, 2018
دورات يمكنك الالتحاق بها على الفور... خذ دورة عبر الإنترنت على Certified Ethical Hacker (CEH) ابتداءً من الآن. See all courses

قيِم هذه الصفحة