Select Page

Keylogging:  What is it?  How does it work?  How do hackers use this technique to gather intelligence?

As a sub-technique of “Input Capture” from the MITRE ATT&CK framework, Keylogging is the most prevalent type of input capture hackers use to intercept credentials.  Watch as our CEO Craig Stevenson plays the role of hacker and demonstrates how an adversary captures all the keystrokes that happen on their target’s computer.