Ask Question

A client has asked you to install a keylogger on several target systems in order to see if their anti-malware software can detect the software used. You have decided to deploy a keylogger that can be sent via e-mail and utilizes executables and registry entries that can be renamed to provide some level of stealth. What keylogger should you use?

+5
Answers (1)
  1. 16 January, 00:18
    0
    Spector Professional

    Explanation:

    Spector Pro Technology (Spector Professional) is an older software application for device monitoring.

    The following actions would be registered on any Windows PC (or MAC):

    Chat transcripts for conversations. Sent or received emails. Websites that have been visited. Subtly or invisibly runs (Stealth). Extreme blocking of the website.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “A client has asked you to install a keylogger on several target systems in order to see if their anti-malware software can detect the ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers