ethical-hacker video for pato, a professional hacker, gained unauthorized access to a target system. To access password-protected files, he established a
Pato, a professional hacker, gained unauthorized access to a target system. To access password-protected files, he established a keylogger using Metasploit to sniff users’ keystrokes on the target machine. This command displays all the sniffed keystrokes on the Pato’s system console. Identify the Metasploit command that allowed Pato to sniff the user’s keystrokes on the target machine.