It wouldn't be hard to program in, but I rather like it the way it is since it's actually way more stealthy. As a systems administrator if I found that this happened on my network I could check traffic logs and possibly find the drop site that the cracker used.
How would I go about programming the capacity to copy (LOCALLY, to the switchblade!) particular documents, (like MSN Messenger Logs, given the directory is known), while maintaining stealthiness? Any guidance/help would be greatly appreciated.
Also, is there a reason why mspass.exe and/or pspv.exe wasn't encrypted like pwdump was? mspass, especially, would be crucial to my... switchblading.