First page Back Continue Last page Summary Graphic
8. Observe Keystrokes
Break into a user's system and listen to their keystrokes as they type in the password used to reveal their private key (for systems that protect the private key file with some other form of cryptography).
Notes: