WINDOWS 7 - KEYLOGGER
- Layout for this exercise:

- Keyscan_start
command starts the process of capturing keystrokes at the victim's
machine:

- Now,
let's suppose that a user at the victim's machine writes a set of
characters, like for instance:

- The attacker can achieve all those characters just using the command keyscan_dump:

- Once the
attack succesfully performed, the keyscan process can be stopped:
