Keylogger Intro and Environment Setup

Length: 00:10:59

Lesson Summary:

The first step in deploying or configuring any sort of software, malicious or benevolent, is setting up the environment in which it can be examined, compiled, and configured. The same goes for the Keylogger. Before we can successfully deploy a Keylogger binary, we need to configure the source code and compile it.

This lesson is only available to Linux Academy members.

Sign Up To View This Lesson
Or Log In

Looking For Team Training?

Learn More