CAPEC 568 Capture Credentials via Keylogger

Draft Detailed Unknown Risk
Severity High

Description

An adversary deploys a keylogger in an effort to obtain credentials directly from a system's user. After capturing all the keystrokes made by a user, the adversary can analyze the data and determine which string are likely to be passwords or other credential related information.

Attack Execution Flow

5

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

1