Ask coding questions

← Back to all posts
upsideumop (6)

Can you tell me how each function works?? THx!

Answered by SixBeeps (5057) [earned 5 cycles]
View Answer
SixBeeps (5057)

1.) Create a process that's hidden by default from the user
2.) While the process is open, write any sorts of keypress events to some log file

that's it.

Baconman321 (1060)

I actually made a keystroke logger that is fully functional (it even logs the keystrokes. HOWEVER.. it hashes the contents before it is stored, otherwise it would be illegal).

The repl attached to the share contains the script which has comments with a detailed explanation of how it works.

Basically what sixbeeps said.

However, sometimes the hacker wants to retrieve the contents. In that case the program would send the contents of the file (or stream the key presses directly) to the person in which they can see what you logged.

The program can be even more complex in that it filters out useless keystrokes and detects focus on a username/password input field and/or a document program (like microsoft word) and logging whatever you type in the document.