14Oca
Can a keylogger actually work as a worm? [closed]
I have just recently started studying cybersecurity, although I haven't made my own tool yet, nor understand how to use any other tool, I just decided to learn the whole theory before diving into real action.
I think worms are one of the most dangerous type of attacking tools, especially if they interfere with the Local Area Network, but since keyloggers are sending data concurrently to a specific Connectable, for instance, a database, it actually looks impossible to have a keylogger which is also a type of worm, which increases the amount of existing victims.
So, is that actually possible to have a keylogger which works in a worm_fashioned style?