An attack technique that uses hardware or software to record user input and saves it for future use or transmits it back to the attacker.

A. Keystroke logger
B. Fake website
C. Completely Automated Public Turing test
D. Antivirus software