Python Ethical Hacking - KEYLOGGER(2)】的更多相关文章

Object-Oriented Programming Keylogger Classes Way of modeling program(blueprint). Logically group functions and data. Makes code more readable. More reusable. Separate implementation from usage(encapsulation). Easier to extend. Easier to maintain. Th…
A program that records keys pressed on the keyboard. Common features: Store logs locally(local keyloggers). Report logs to an email or remote server(remote keyloggers). Log screenshots. Start with system startup. Third-Party Module: pynput pip instal…
Report function: Run in the background. Don't interrupt program execution. Every X seconds, send the report. ->Great case for threading. #!/usr/bin/env python import threading import pynput.keyboard log = "" def process_key_press(key): global…
TROJANS A trojan is a file that looks and functions as a normal file(image, pdf, song ..etc). When executed: 1. Opens the normal file that the user expects. 2. Executes evil code in the background (run a backdoor/keylogger ..etc). Download & Execute…
PACKAGING FOR WINDOWS FROM LINUX For best results package the program from the same OS as the target. EG if the target is Windows then package the program from a Windows computer with a python interpreter. Install Windows python interpreter on Linux.…
Cross-platform hacking All programs we wrote are pure python programs They do not rely on OS-specific resources. Result: They work on any OS with a python interpreter. If packaged, they will work on any OS if even if python is NOT installed.…
REVERSE_BACKDOOR Access file system. Execute system commands. Download files. Upload files. Persistence. BACKDOORS An interactive program gives access to a system its executed on. Command execution. Access file system. Upload/download files. Run keyl…
WRITING MALWARE Download file. Execute Code. Send Report. Download & Execute. Execute & Report. Download, Execute & Report. KEYLOGGER A program that records keys pressed on the keyboard. REVERSE_BACKDOOR Access file system. Execute system comm…
Typical Network ARP Spoofing Why ARP Spoofing is possible: 1. Clients accept responses even if they did not send a request. 2. Clients trust response without any form of verification. 1. Run the following command on the victim - Windows 10 Machine. a…
DICTIONARIES Similar to lists but use key instead of an index. LISTS List of values/elements, all can be stored in one variable. Improving the Program Using a List of Dictionaries: #!/usr/bin/env python import scapy.all as scapy def scan(ip): arp_req…