All of the tactics mentioned are useless with high-end keyloggers.
There is a well known exploitation framework called Metasploit that can be deployed via a variety of means, including malicious websites or even remote exploits like MS-08-067.
It has a package called Meterpreter, which runs an...