forked from BrendanBard/bundy
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.php
72 lines (58 loc) · 2.42 KB
/
main.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
<html>
<head>
<title>fSociety</title>
<link rel="icon" type="image/png" href="img/icon.png" />
</head>
<style>
body {
background-color:#191919;
height: 100%;
font-family: calibri;
}
.topnav {
background-color: #333;
overflow: hidden;
}
/* Style the links inside the navigation bar */
.topnav a {
float: left;
color: #f2f2f2;
text-align: center;
padding: 14px 16px;
text-decoration: none;
font-size: 17px;
}
/* Change the color of links on hover */
.topnav a:hover {
background-color: #ddd;
color: black;
}
/* Add a color to the active/current link */
.topnav a.active {
background-color: #B9081C;
color: white;
}
</style>
<header>
<h1><font color="white"><i>G3N3RAL K3N0BI</i> KEYLOGGER</h1>
<h3>CNIT 315 Final Project<br>
Colin Cowie | Brendan Bard | Matt Albright | Caleb Wood | Zane Beechler</font></h3>
</header>
<body>
<div class="topnav">
<a class="active" href="#">Home</a>
<a href="data.php">Data</a>
</div>
<br><p><font color="white">Welcome!
<p> We are team <i>H3ll0 Th3r3</i> and for our final project we made the <i>G3n3ral K3n0bi Keylogger.</i> A keylogger is a program that captures and records user input into a log. They usually are intended to run covertly on a a victim's machine in the background. The practicality of keyloggers is that they could capture private or sensitive information, such as a passwords or banking information, when the user types it in. As such, these type of programs are typically used maliciously to invade the victim's privacy, and thus are considered malware.
<p>Due to the dominance of Microsoft Windows in the PC operating system market, the <i>G3n3ral K3n0bi Keylogger</i> will only work on Windows machines. The program will be distributed by forwarding a phishing email containing a malicious but convincing/worthwhile file. Once installed on the victim's device, the log file is sent to a server where the team can view and access. This requires that the target device is connected to the internet.
<br>
<br>
<p> Team Members:
<pre> <b>Colin Cowie</b> [email protected] @th3_protoCOL</pre>
<pre> <b>Brendan Bard</b> [email protected] @urmom</pre>
<pre> <b>Matt Albright</b> [email protected] Club Penguin: The574</pre>
<pre> <b>Caleb Wood</b> [email protected] @IgotW00d</pre>
<pre> <b>Zane Beechler</b> [email protected] @MiamiBeechler</pre></p></font></p>
</body>
</html>