Answer:
Attackers can use XSS to perform keystroke logging by injecting a malicious script that captures and sends keystrokes entered by users to an external server controlled by the attacker.
Attackers can use XSS to perform keystroke logging by injecting a malicious script that captures and sends keystrokes entered by users to an external server controlled by the attacker.
You may be interested in:
Web Security MCQs