. "Depending on what I am up to, and what I am after, I might combine it with some social engineering, for example, such as causing a workstation or app crash, getting helpdesk or admin personnel to login to look at things, and grabbing their credentials, or just to grab usernames, passwords and web app URL's, etc., from 'Joe user.'But yeah, most pentesters I know still use keyloggers, frequently, unde" . . .