I think this is an interesting attack vector, but seems overly complicated especially if you can install a key logger(and probably do it faster).
I think this is an interesting attack vector, but seems overly complicated especially if you can install a key logger(and probably do it faster).