forgotten said:
A keylogger can't be installed on a client that is merely connected to a network. Your logic is riding on variables that may or may not be present.
Sorry dude, but I gotta quote you and argue the point. When there is connections to a network, you can easily find open ports to submit malicious requests through, alongside possible malicious code. Sure there are times when nothing is fucking possible, like when the ethernet cable is unplugged. But when theres a connection, and theres a will, theres a way.
Trust me, no secure network is as secure as you may think. Exploitation is possible from low level all the way to high level client programming. You can exploit the firmware of a router, hell even the fucking cabel modem, if you really wanted to. Its just a matter of a little time, a little energy, a bit of intelligence.
I hate seeing myself as a nerd for my previous involvements in such "counter-productive" behavior, taking something that works, and forcing it to not work for others. But you learn from your past to influence other's futures.
In short if you wanted to start tracking down every bit of information from another connected computer on your network:
- Setup a way to log and retrieve data from all packets being sent and recieved.
- Use packet information for retrieving personal security information ie: passwords, logins, etc.
- If packet logging yields sparse results, real-time packet modification schemes can be executed to modify the resulting incoming and outgoing packets, the flow, and transfer, and the ability to exploit the low-security of the connections between computers inside the same network.
You can easily implant a trojan on a networked computer, and exploiting the vulnerabilities that lie within a home consumer network's shitty hardware and nearly useless protection mechanisms, fuck with some ActiveX and you got yourself Norton giving error messages til the day's done. Trust me, the level of intelligence needed to destroy your locally networked computers is as low as France is good at winning wars. I mean, a few articles on security sites for latest exploitations available and known on firmware and software versions, simple tutorial on injecting code, and boom, you got yourself a little tunnel from your computer into the "Fuck You" zone on another.