
Often the keylogger function is embedded in another piece of malware. Think of it as digital tap that captures every keystroke from the keyboard. Keyloggers for IT PeopleĪ keylogger is a piece of a software or hardware that can intercepting and record the keystrokes of a compromised machine. I also like using C# in my coding examples since it can be read like a story even if one isn’t familiar with the syntax. Keep in mind that most real-world malware tools are coded in C/C++/Delphi in order to discard the dependency of. I won’t be getting too technical, so don’t get scared off.įor these informal “hacking 101 classes”, you’ll need coding knowledge - C# and Java - and some understanding of Windows. Once you understand how relatively simple it is to create undetectable malware, you’ll want to take a different approach to data security at your organization. I’m an infosec specialist at Varonis and in my experience, you’ll be better at data security once you understand how the offense plays its game.Īnd that’s the reason I decided to start this series of posts on the details underlying malware and different hacking tool families. As Inside Out blog has been pointing out, you have to think like a hacker to stop one.

Why Should an IT Person Learn These Dark Skills?įile that under “know your enemy”. On the other hand, I really believe that an IT security person should master some of the programming concepts that go into malware.
