Designing A Kernel Key Logger

Posted in Internet Security Whitepapers, System Hacking

0.0/5 rating (0 votes)

The following tutorial outlines the design of a simple key logger implementation using a kernel filter driver. Although the key logger itself is only proof-of-concept and lacks the functionality of a useful attack tool, it presents filter drivers as a potentially useful (and underutilized) rootkit hooking technique while demonstrating a few of the basic programming challenges that distinguish kernel design from user land development. The filter is based on the method shown in the ctrl2cap program at sysinternals.com.
∙:∙ If you have trouble viewing this document, please click the link below!
Designing A Kernel Key Logger

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.