32.8k views
2 votes
A client has asked you to install a keylogger on several target systems in order to see if their anti-malware software can detect the software used. You have decided to deploy a keylogger that can be sent via e-mail and utilizes executables and registry entries that can be renamed to provide some level of stealth. What keylogger should you use?

User Stekhn
by
6.0k points

1 Answer

7 votes

Answer:

Spector Professional

Step-by-step explanation:

Spector Pro Technology (Spector Professional) is an older software application for device monitoring.

The following actions would be registered on any Windows PC (or MAC):

  • Chat transcripts for conversations.
  • Sent or received emails.
  • Websites that have been visited.
  • Subtly or invisibly runs (Stealth).
  • Extreme blocking of the website.
User Chnrxn
by
6.4k points