Testing the Example


You can compile the files in Chapter 8 Ghost to test the new keyboard logging feature. If all goes well, the file C:\keys.txt will contain every printable key pressed from the end of “net start MyDeviceDriver” to the end of “net stop MyDeviceDriver.” This includes keys pressed in any application. An example of keyboard logging is shown in Figure 8-4.

image from book
Figure 8-4




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net