Ce hv6 module 47 spying technologies

  • 59 views
Uploaded on

Ce hv6 module 47 spying technologies

Ce hv6 module 47 spying technologies

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
59
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
3
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Ethical Hacking and Countermeasures Version 6 Module XLVIIModule XLVII Spying Technologies
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.chinapost.com.tw/print/144096.htm
  • 3. Module Objective This module will familiarize you with: • Spying i f i• Motives of spying • Spying Devices • Spying Tools • Anti-Spying Toolst Spy g oo s EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow SpyingSpying Motives of spying Spying Devices Motives of spying Spying Devices S i T lSpying Tools A i S i T l EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spying Tools
  • 5. Spying Spying is a method of observing a person’s activities without his/her knowledge In the computer arena spying is a technique used to continuouslyIn the computer arena, spying is a technique used to continuously monitor the computer or the network • It is used by the crackers to know the work done by the user on a ti l tparticular computer • Spying does not corrupt or hack the data but uses the data according to the spy’s interest Hidd i d d i d bHidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Such spyware devices can be used for corporate espionage
  • 6. Motives of Spying MoneyMoney • The main intention of spying is the financial gain Individual conflicts • To take revenge due to some personal orTo take revenge due to some personal or organizational conflicts Information • To get the information which will be useful for the outsider in future EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Spying Devices EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://newsinfo.inquirer.net/
  • 9. Spying Using Cams Spy cams are used to spy on the intended individualsSpy ca s a e used to spy o t e te ded d dua s visually As these cameras are very tiny in size, they are not detectable through the naked eyes These cams sometimes also record voice with the help of a microphone which allows you to check even from a far distancea a d sta ce Spy cams may be kept in different objects such as, l h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pens, goggles, watches etc.
  • 10. Video Spy Video spying is used to spy continuously on any particular bj tperson or object Video spy cams come with audio enabled feature Night vision video cams help to take the videos at the time of low lightg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 11. Video Spy Devices Ultra Mini Pencil Eraser Sized Video transmitter and receiver Pinhole Video Camera Video transmitter and receiver Video spy camera on the remote car Smoke detector concealing hidda hidden camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. Video Spy Devices (cont’d) Car-Video-Recorder(LM-CVR2)Digital Video Recorder/Player EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Video Spy Devices (cont’d) Wireless video camera Lighter based Video camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 14. Video Spy Devices (cont’d) Rocket spy with Digital VideoBelt Buckle Video Spy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Tiny Spy Video Cams Screw Spy Camera with Sound Tiny video camera that can slip into a pack of cigarettes or bubblegum wrapper Sou d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Tiny Spy Video Cams (cont’d) Wireless spy video camPin hole spy camera Miniature Digital camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Underwater Video Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Camera Spy Cameras can be used to spy on any particularpy y p person or object and take snapshots for it S h th t t kSome cameras have sensors that take a snapshot when anything moves in front of it which is useful to secure a particular area Snapshots can be taken for a particular instant of time which can be set Night vision cams help to take the snapshots at the night time EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited the night time
  • 19. Camera Spy Devices (cont’d) Blow dryer spy camera Hidden Camera Desk Lamp Micro dot Camera Subminiature Spy Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. Camera Spy Devices (cont’d) Spy Tie With Built In High Buttonholed Spy Camera Spy Tie With Built-In High- Resolution Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Camera Spy Devices (cont’d) Button Camera KitSecret Smoker Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Camera Spy Devices (cont’d) Wireless Hidden Spy Cameras Bullet Pinhole Spy Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Goggle Spy Under water digital camera mask records under water videos and audio Spy sunglass video camera records under water videos and audio py g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Watch Spy Watch consists of small analogue camera It consists of LCD camera with RUIM card used in GSM phones Miniature watch built in with spy camera The spy camera is a touch screen LCD display EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Pen Spy Wireless camera spy pen Spy pen with built in USB interface and a card reader SD/MMC Spy pen digital voice recorder EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Binoculars Spy Digital binoculars spy camera that records video clips Digital Camera Binoculars Long distance surveillance digital camera Spy camera with LCD screen EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Toy Spy Wireless Mini SpyCamThis spy plane is used to trace the enemy movement EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. Toy Spy (cont’d) Remote control car with built in web cameraInfrared video cam spy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Spy Helicopter EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Wireless Spy Camera Wireless spy camera draws the power from fluorescent light tubesfluorescent light tubes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Spy Kit Button Camera / Screw Set - CMOS C l H d i d It spies through wall device CMOS Color Hardwired p g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. Spy Scope: Spy Telescope and MicroscopeMicroscope Spy Scope is a combined telescope and microscope in one pocket sized packagesized package Features: • Spying operations such as people watching • Suspicious activity at long distances EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Spy Eye Side Telescope L k t i ht h d dLook straight ahead and you can view the object at your side EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Audio Spy Spying on any individual with the help of audio recorder’sSpying on any individual with the help of audio recorder s It records the conversation done by some peopleIt records the conversation done by some people They are of tiny micro phones which is nearly impossible to detect by the naked eyedetect by the naked eye EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Audio Spy Devices MicroDot super mini digital audio recorder Spy Microphone Listening Deviceaudio recorder Matchstick LapelMatchstick Lapel Microphone Digital Voice Watch Recorder Mini Shotgun Spy Microphone f di illfor Audio Surveillance EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Audio Spy Devices (cont’d) h i hShotgun Microphone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. Eavesdropper Listening Device This EAR SPY listening device is used for eavesdropping on any distant conversation It uses a ear mounted tiny amplifier to increase the level of ambient sound It allows to eavesdrop on conversations discreetly upto 80 feet away EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. GPS Devices GPS device in Shoes GPS Tracking Device EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. GPS Devices (cont’d) GPS Watch Trackstick GPS data logger EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. Spy Detectors Spy detectors are used to spy detect delete and recoverSpy detectors are used to spy, detect, delete, and recover spywares It consists of a database of most commonly found spywaresIt consists of a database of most commonly found spywares which is used to delete the spywares immediately It encrypts all confidential files and folders to provideyp p complete safety EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Spy Detector Devices Bug DetectorAnti-Spy Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Spy Detector Devices (cont’d) Smoke Detector CameraPocket Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Spy Detector Devices (cont’d) Bug Detector Set Analog and Digital Bug Detector Anti-wireless Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Vendors Hosting Spy Devices Spy Gadgets serious surveillance solutions h // d /• http://www.spygadgets.com/ The Spy Tools Directory • http://www.spy-tools-directory.com/index.htmlp // py y / Amazon.com • http://www.amazon.com/b?ie=UTF8&node=166205011 Spy Associates spy equipments • http://www.spyassociates.com/ Paramountzone 007 spy gadgetsParamountzone 007 spy gadgets • http://www.paramountzone.com/globalear-spy-gadget.htm Hi-tech surveillance Spy gadgets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • http://www.spygearco.com/spy-gadgets.htm
  • 45. Spy Gadgets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Spy Tools Directory EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. Amazon.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. Spy Associates EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. Paramountzone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Surveillance Protection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 51. SpySpy Tool Spying Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. Net Spy Pro-Computer Network Monitoring and Protectiong Net Spy Pro is the combination of network monitoring andpy g administration software tool suite N k S S f k d i l l hiddNetwork Spy Software runs on networks and is completely hidden to others within the network The user accesses the activity logs via a hidden and password protected interface EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Net Spy Pro-Computer Network Monitoring and Protection: Screenshotg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. SpyBoss Pro SpyBoss Pro is an Internet monitoring and keylogger computer software toolsoftware tool It records all the details of what is done on the computer and records it It uses advanced surveillance screen snapshot features It gives step by step order of the computer utility by the user EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. SpyBoss Pro: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. CyberSpy CyberSpy is a powerful PC monitoring and surveillance tool It records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even desktop snapshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. Spytech SpyAgent Spytech SpyAgent is a powerful monitoring solution with tons ofSpytech SpyAgent is a powerful monitoring solution with tons of features and configuration options It records keystrokes, windows opened, applications run, passwords used, Internet connections, websites visited, emails sent and received, and even captures screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 58. Spytech SpyAgent: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 59. ID Computer Spy ID Computer Spy is designed for automatic Internet and PC surveillancesurveillance It records emails, Instant Message chats, web sites visited, as well as program's activities Features: • Monitors Internet activities and website viewing • Registers PC actions and launched• Registers PC actions and launched applications • Records Keystrokes • Offers password protection for log files id i i i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Provides a warning monitoring screen
  • 60. ID Computer Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 61. e-Surveiller e-Surveiller is a powerful user-activity monitoring, logging, and real-p y g, gg g, time surveillance software package Computers can be monitored on a standalone computer, on a local area network, and on remote computers across the Internet EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 62. e-Surveiller: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 63. KGB Spy Software KGB Spy Software integrates several tools to ensure thorough monitoring of computer systemsmonitoring of computer systems It keeps track of every word or keystroke command entered by a user and the website visitedand the website visited It monitors the clipboard and records all pasted items Features: • Stealth mode and visible mode of work • Custom list of monitored applications EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Reports over e-mail and FTP connection
  • 64. KGB Spy Software: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 65. O&K Work Spy O&K Work Spy collects the detailed statistics of what the user d th tdoes on the computer It i t f th t • Work Spy Service receives statistics from It consists of three components: Work Spy Service receives statistics from the client module and saves it to the database • Work Spy Client is a small client part that must be installed on each computer of themust be installed on each computer of the employee whose comparative statistics you want to collect • Work Spy Control Program is used to EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited py g get and analyze the statistics
  • 66. O&K Work Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 67. WebCam Spy WebCam Spy is a useful tool for home security Features: • Automatic video recording • Automatically adjust sound volume • Automatic snapshot saving in BMP d JPEG fBMP and JPEG format • Runs external application after motion is detected EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 68. WebCam Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 69. Golden Eye Golden Eye tool tells you about the victim’s activities onGolden Eye tool tells you about the victim s activities on the computer It spies: • Keystrokes (username & password) • Websites Visited Wi d Titl f P• Window Title of Programs • File and Folder Operation • Screenshot • Exe File Path EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Exe File Path
  • 70. Golden Eye: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 71. A ti S i T lAnti-Spying Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 72. Internet Spy Filter In real time it blocks spyware web bugs worms cookies ads scriptsIn real time, it blocks spyware, web bugs, worms, cookies, ads, scripts to protect from being profiled and tracked It acts like a firewall to protect online privacy and security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 73. Internet Spy Filter: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 74. Spybot - S&D Spybot - S&D is an adware and spyware detection and removal tool It detects various keylogging and other spy utilities It securely removes PC and Internet usage tracks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 75. Spybot - S&D: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 76. SpyCop SpyCop finds spy programs such as Spector designed f ll d l d dspecifically to record your screen, email, passwords, and much more Features: • Stops Password Theft Dead: It detects spy software that is put on your computer to capture your passwords • Keeps Your Emails Private: It alerts you if your emails are being snooped by spy software • Kills Instant Message & Chat Spy Software: It keeps your online chats and instant messages safe from prying eyes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited online chats and instant messages safe from prying eyes
  • 77. SpyCop: Screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 78. Spyware Terminator Spyware Terminator is a full-featured adware and spyware scanner with real time protectionwith real-time protection It offers manual and scheduled scans The scan behavior can be customized EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 79. Spyware Terminator: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 80. XoftSpySE XoftSpySE is a spyware detection scanning and removalXoftSpySE is a spyware detection, scanning and removal tool, protecting you from unwanted Spyware Features: • Complete PC scanning • Removes ALL Spyware Parasites, unwanted Toolbars, and Browser HijacksHijacks • Prevents identity and credit card theft EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 81. XoftSpySE: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 82. Summary Spying is a technique to continuously monitor the computer or theSpying is a technique to continuously monitor the computer or the network and record all the web pages that are visited S i i d h i f i hi h ill b f l f hSpying is used to get the information which will be useful for the outsider in future Network spying monitors the web page accessed on the computer and makes a chronological record of the visited URL’s SpyCop finds spy programs such as Spector designed specifically to record your screen, email, passwords, and much more EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 83. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 84. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited