Skip navigation

Looking at the keylogger source code, part 3

Looking at the keylogger source code, part 3: Windows Performance Toolkit: Spyware Detection
Looking at the keylogger source code, part 3: Windows Performance Toolkit: Spyware Detection

In Part 2 we discussed the Email Sending, here we finish our discussion by looking at the heart of the key logger. The HOOKS! How the key logger will hook into each key press and intercept the interrupt code message so it can pass it off to its own sub routine callback procedure for logging. We then move onto the entry point of the application main.cpp and finish with a resource file (.rc file) which lets us make the key logger undetectable in task manager by saying it was published by Microsoft Corporation.

Resume Transcript Auto-Scroll
Skill Level Intermediate
55m 6s
Duration
13,423
Views
Show More Show Less
Skills covered in this course
Development Tools Developer Windows

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start My Free Month

Start your free month on LinkedIn Learning, which now features 100% of Lynda.com courses. Develop in-demand skills with access to thousands of expert-led courses on business, tech and creative topics.

Start My Free Month