Summary

In this chapter, we saw how to configure a keylogger and also dealt with password manager to securely store the device credentials. We also learned about a new method—Man in the Browser. Further, we saw the process of Firefox API hooking with Immunity Debugger and performed the password phishing process.

In the end, we discussed the countermeasures on how to protect yourself and secure your account from the attacks.

In the next chapter, we will set up our own hacking environment in VirtualBox.

Get Python for Offensive PenTest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.