See what this course is all about. Get a glimpse of this keylogger working, you will see it get scanned by antivirus and then its reported as "No Threat". Then even on a VPN connection, we go to bankofamerica.com and the keylogger automatically sends an email showing in plain text the website visited, the user name entered and the password entered.
- [Narrator] Keyloggers are a common form of viral spyware. They capture literally every thing you type on your system. You will see this keylogger in action. You will see it literally get scanned by antivirus programs like AVAST and be cleared as okay. You will see the automatic email that contains the recorded keystrokes in plain text, and you will be shown the source code of the keylogger. Even if you browse the internet on a virtual private network, commonly referred to as VPN, this keylogger will still record every keystroke you type, and send an email containing an encrypted log file and plain text to the hacker for them to extract the information about you.
They can see all the websites you've visited for that day, that week, the entire month. They can find out your habits through social engineering. This is obviously a huge invasion of privacy, and what you see in this course is purely for educational purposes, so you can help protect yourself. With that said, I do not condone the misuse of the knowledge obtained from this course, nor do you have my permission to use the keylogger and the knowledge obtained here to perform any malicious acts. Using this on someone without their permission is a federal offense.
It's a felony and the FBI does get involved. Simply put, it's just not worth the worry of wondering when the FBI is going to knock on your door. The techniques you see here are meant to help you with being more confident that no one is eavesdropping on you. By the end of this course, you will have a better understanding of what a keylogger is, how it works, and how to detect if one is currently running on your machine. So, once again, the purpose of this course is to show you how to detect a keylogger that bypasses antivirus, not how to write one so you can deploy it on an unsuspecting victim.