NOTE: This program is for education purposes only.
Project 2 of The Complete Python Project for Cybersecurity involved me taking an attempt in creating a keylogger within Python. Well, it's a basic keylogger which has it's limitations, but still an opportunity to build something malicious within Python. Here's what you need to know about the video...
Building a keylogger is rather easy. Now this totally depends on what type of keylogger you are creating and how sophisticated you desire to make it. The more sophisticated it is, the better chance you are to have accurate results.
This particular keylogger had it's limitations, as outlined in the last part of the video. The three key limitations to this keylogger included:
1) The amount of emails being received per set amount of time
2) The context of where the user is logging in (ex Facebook.com)
3) This is a 'local keylogger', meaning you have already have access to target victim before deploying this program
Great lessons learned here in Project 2. I would highly advise you look into creating a keylogger, even if it's basic, as this type of challenge will help you with reading documentation and deployment of the code.
Important Timestamps:
0:00 - Introduction & Background into where I am at within the overall project
1:25 - Briefly walk through the brainstormed plan and sketch
3:20 - Keylogger intro and project kick-off
3:43 - Explain my first step, which was creating an overall structure
4:45 - Introduce my second step, which was the execution phase
6:19 - Finish the keylogger & walk through basic functionality behind program
8:24 - Concluding thoughts on project and transition into Level 3
Courses & Resources Mentioned:
Complete Python & Ethical Hacking Course for Cybersecurity: https://courses.stationx.net/courses/405412?coupon_code=CYBERXREGULAR&affcode=58751_wryk0rkb
Notes to Python & Ethical Hacking Course: https://docs.google.com/document/d/1U1u84deR4BnPouo3VB-VYqo1ATcajFRmi3rxN0R-znQ/edit?usp=sharing
Github Link: https://github.com/collinsmc23/keylogger-level-two
For more information and extra help, visit: https://www.cyberinternacademy.com or https://www.cybercademy.org
Join the Email List for More Information and Exclusive Updates!
Sign up: https://www.cyberinternacademy.com/em...
Follow Me:
Twitter: https://www.twitter.com/collinsinfosec
Instagram: https://www.instagram.com/collinsinfosec
Join the Discord Server:
https://discord.gg/mvgSnXy
Have questions, concerns, comments?:
Email me: grant@cyberinternacademy.com
Gear:
Laptop (Lenovo X1 Carbon Ultrabook): https://amzn.to/2O0UfAM
Monitors (Dell D Series 31.5” D3218HN): https://amzn.to/2EXlgRF
Keyboard (Velocifire VM01): https://amzn.to/2TEswfd
Headphones (Audio Technica ATH-M40x): https://amzn.to/2F4Tvq6
Songs Used:
V.I.P.N - EPIC CLOUD TRAP BEAT No Copyright Trap
DRUMKEYZ - SPLASH FREE TRAP BEAT No Copyright Trap
Chill & Relaxing Lo-Fi Hip-Hop Instrumental Warm Nights
Project 2 of The Complete Python Project for Cybersecurity involved me taking an attempt in creating a keylogger within Python. Well, it's a basic keylogger which has it's limitations, but still an opportunity to build something malicious within Python. Here's what you need to know about the video...
Building a keylogger is rather easy. Now this totally depends on what type of keylogger you are creating and how sophisticated you desire to make it. The more sophisticated it is, the better chance you are to have accurate results.
This particular keylogger had it's limitations, as outlined in the last part of the video. The three key limitations to this keylogger included:
1) The amount of emails being received per set amount of time
2) The context of where the user is logging in (ex Facebook.com)
3) This is a 'local keylogger', meaning you have already have access to target victim before deploying this program
Great lessons learned here in Project 2. I would highly advise you look into creating a keylogger, even if it's basic, as this type of challenge will help you with reading documentation and deployment of the code.
Important Timestamps:
0:00 - Introduction & Background into where I am at within the overall project
1:25 - Briefly walk through the brainstormed plan and sketch
3:20 - Keylogger intro and project kick-off
3:43 - Explain my first step, which was creating an overall structure
4:45 - Introduce my second step, which was the execution phase
6:19 - Finish the keylogger & walk through basic functionality behind program
8:24 - Concluding thoughts on project and transition into Level 3
Courses & Resources Mentioned:
Complete Python & Ethical Hacking Course for Cybersecurity: https://courses.stationx.net/courses/405412?coupon_code=CYBERXREGULAR&affcode=58751_wryk0rkb
Notes to Python & Ethical Hacking Course: https://docs.google.com/document/d/1U1u84deR4BnPouo3VB-VYqo1ATcajFRmi3rxN0R-znQ/edit?usp=sharing
Github Link: https://github.com/collinsmc23/keylogger-level-two
For more information and extra help, visit: https://www.cyberinternacademy.com or https://www.cybercademy.org
Join the Email List for More Information and Exclusive Updates!
Sign up: https://www.cyberinternacademy.com/em...
Follow Me:
Twitter: https://www.twitter.com/collinsinfosec
Instagram: https://www.instagram.com/collinsinfosec
Join the Discord Server:
https://discord.gg/mvgSnXy
Have questions, concerns, comments?:
Email me: grant@cyberinternacademy.com
Gear:
Laptop (Lenovo X1 Carbon Ultrabook): https://amzn.to/2O0UfAM
Monitors (Dell D Series 31.5” D3218HN): https://amzn.to/2EXlgRF
Keyboard (Velocifire VM01): https://amzn.to/2TEswfd
Headphones (Audio Technica ATH-M40x): https://amzn.to/2F4Tvq6
Songs Used:
V.I.P.N - EPIC CLOUD TRAP BEAT No Copyright Trap
DRUMKEYZ - SPLASH FREE TRAP BEAT No Copyright Trap
Chill & Relaxing Lo-Fi Hip-Hop Instrumental Warm Nights
- Category
- Tech Education Channel
Be the first to comment