Skip navigation

Looking at the keylogger source code, part 3

Looking at the keylogger source code, part 3: Windows Performance Toolkit: Spyware Detection
Looking at the keylogger source code, part 3: Windows Performance Toolkit: Spyware Detection

In Part 2 we discussed the Email Sending, here we finish our discussion by looking at the heart of the key logger. The HOOKS! How the key logger will hook into each key press and intercept the interrupt code message so it can pass it off to its own sub routine callback procedure for logging. We then move onto the entry point of the application main.cpp and finish with a resource file (.rc file) which lets us make the key logger undetectable in task manager by saying it was published by Microsoft Corporation.

Resume Transcript Auto-Scroll
Skill Level Intermediate
55m 6s
Duration
11,261
Views
Show More Show Less
Skills covered in this course
Development Tools Developer Windows

Continue Assessment

You started this assessment previously and didn't complete it. You can pick up where you left off, or start over.

Start Your Free Trial Now

Start your free trial now, and begin learning software, business and creative skills—anytime, anywhere—with video instruction from recognized industry experts.

Start Your Free Trial Now