Course details
If your computer could talk, it would spill all sorts of secrets. Every day we interact with our computers through keyboards, microphones, web cameras, and similar devices and willingly input sensitive information.
This data could divulge a wealth of lucrative information you'd never want exposed to an unauthorized party.
In this course we dive into writing our own keylogger tool for surveilling the target system to extract some of this sensitive information. I won't name names, but I tested these tools against three major Windows antivirus vendors and not one reported any malicious activity taking place.
We'll utilize Python to create a tool that will collect keystroke inputs from a target Windows system. This will give any ethical hacker access to a treasure trove of valuable information.
Don't wait, discover the secrets to cyber surveillance with Python in this complete course for ethical hackers, penetration testers, system administrators or anyone with an interest in cyber security.
Updated on 22 February, 2018Certified Ethical Hacker (CEH) Related Questions
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Level-3 Ethical USB Hacking Course CloudAED 55
AED 1,249Duration: Upto 1 Hour - Ethical Hacking from Zero To Hero Course LineAED 89Duration: Upto 10 Hours