In this post, we'll keep analyzing post-exploitation tools and techniques. a) Recording keystrokes We can start a keylogger on the victim machine with keyscan_start. Anything we type in the victim...