tundramagi wrote:Default passwords, exploit scripts etc. You allready know what router the person's traffic goes through with a traceroute (also: you only need a computer on the same subnet as them, you don't need to have gained access to the router itself if one of the 100 or 200 (or more) of the other computers is an easier target). Go play with ettercap.sf.net (it's opensource) on your local subnet (or apt-get install ettercap). It's been around for a long time. You will discover that you don't need to break into someone's house to watch their traffic.
So, yea, passwords with out full encryption...
What? How are default passwords connected with encryped traffic? And what are those exploit scripts? What do they exploit in raw connection?
Whether your computer actually receives the unicasted packet from the wire and decides to ignore or do not receive at all depends on the connection type.