In this chapter, we saw how to configure a keylogger and also dealt with password manager to securely store the device credentials. We also learned about a new method—Man in the Browser. Further, we saw the process of Firefox API hooking with Immunity Debugger and performed the password phishing process.
In the end, we discussed the countermeasures on how to protect yourself and secure your account from the attacks.
In the next chapter, we will set up our own hacking environment in VirtualBox.