It is not clear how the keylogging should work. I have successfully injected keystrokes using a payload. But shouldn't I be able to attack a system via Keylogging with or without injecting anything? Just capture the keystrokes.
POC. Send keystrokes to lock the system then keylog the user entering credentials.
It is not clear how the keylogging should work. I have successfully injected keystrokes using a payload. But shouldn't I be able to attack a system via Keylogging with or without injecting anything? Just capture the keystrokes.
POC. Send keystrokes to lock the system then keylog the user entering credentials.