Ethical Hacking and
Countermeasures
Version 6
Module XLVIIModule XLVII
Spying Technologies
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.chin...
Module Objective
This module will familiarize you
with:
• Spying
i f i• Motives of spying
• Spying Devices
• Spying Tools
...
Module Flow
SpyingSpying
Motives of spying
Spying Devices
Motives of spying
Spying Devices
S i T lSpying Tools
A i S i T l...
Spying
Spying is a method of observing a person’s activities without
his/her knowledge
In the computer arena spying is a t...
Motives of Spying
MoneyMoney
• The main intention of spying is the financial gain
Individual conflicts
• To take revenge d...
Spying Devices
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://newsinfo...
Spying Using Cams
Spy cams are used to spy on the intended individualsSpy ca s a e used to spy o t e te ded d dua s
visual...
Video Spy
Video spying is used to spy continuously on any particular
bj tperson or object
Video spy cams come with audio e...
Video Spy Devices
Ultra Mini Pencil Eraser Sized Video transmitter and receiver
Pinhole Video Camera
Video transmitter and...
Video Spy Devices (cont’d)
Car-Video-Recorder(LM-CVR2)Digital Video Recorder/Player
EC-Council
Copyright © by EC-Council
A...
Video Spy Devices (cont’d)
Wireless video camera Lighter based Video camera
EC-Council
Copyright © by EC-Council
All Right...
Video Spy Devices (cont’d)
Rocket spy with Digital VideoBelt Buckle Video Spy
EC-Council
Copyright © by EC-Council
All Rig...
Tiny Spy Video Cams
Screw Spy Camera with
Sound
Tiny video camera that can slip
into a pack of cigarettes or
bubblegum wra...
Tiny Spy Video Cams (cont’d)
Wireless spy video camPin hole spy camera
Miniature Digital
camera
EC-Council
Copyright © by ...
Underwater Video Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Camera Spy
Cameras can be used to spy on any particularpy y p
person or object and take snapshots for it
S h th t t kSome ...
Camera Spy Devices (cont’d)
Blow dryer spy camera Hidden Camera Desk Lamp
Micro dot Camera Subminiature Spy Camera
EC-Coun...
Camera Spy Devices (cont’d)
Spy Tie With Built In High
Buttonholed Spy Camera
Spy Tie With Built-In High-
Resolution Camer...
Camera Spy Devices (cont’d)
Button Camera KitSecret Smoker Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved...
Camera Spy Devices (cont’d)
Wireless Hidden Spy Cameras Bullet Pinhole Spy Camera
EC-Council
Copyright © by EC-Council
All...
Goggle Spy
Under water digital camera mask
records under water videos and audio
Spy sunglass video camera records under wa...
Watch Spy
Watch consists of small
analogue camera
It consists of LCD camera with RUIM
card used in GSM phones
Miniature wa...
Pen Spy
Wireless camera spy pen Spy pen with built in USB interface
and a card reader SD/MMC
Spy pen digital
voice recorde...
Binoculars Spy
Digital binoculars spy camera
that records video clips
Digital Camera Binoculars
Long distance surveillance...
Toy Spy
Wireless Mini SpyCamThis spy plane is used to
trace the enemy movement
EC-Council
Copyright © by EC-Council
All Ri...
Toy Spy (cont’d)
Remote control car with
built in web cameraInfrared video cam spy
EC-Council
Copyright © by EC-Council
Al...
Spy Helicopter
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Wireless Spy Camera
Wireless spy camera draws the power from
fluorescent light tubesfluorescent light tubes
EC-Council
Cop...
Spy Kit
Button Camera / Screw Set -
CMOS C l H d i d
It spies through wall device
CMOS Color Hardwired
p g
EC-Council
Copy...
Spy Scope: Spy Telescope and
MicroscopeMicroscope
Spy Scope is a combined telescope and microscope in one pocket
sized pac...
Spy Eye Side Telescope
L k t i ht h d dLook straight ahead and you
can view the object at your
side
EC-Council
Copyright ©...
Audio Spy
Spying on any individual with the help of audio recorder’sSpying on any individual with the help of audio record...
Audio Spy Devices
MicroDot super mini digital
audio recorder
Spy Microphone
Listening Deviceaudio recorder
Matchstick Lape...
Audio Spy Devices (cont’d)
h i hShotgun Microphone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction ...
Eavesdropper Listening Device
This EAR SPY listening device is used for eavesdropping on any distant
conversation
It uses ...
GPS Devices
GPS device in Shoes GPS Tracking Device
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction...
GPS Devices (cont’d)
GPS Watch Trackstick GPS data logger
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reprod...
Spy Detectors
Spy detectors are used to spy detect delete and recoverSpy detectors are used to spy, detect, delete, and re...
Spy Detector Devices
Bug DetectorAnti-Spy Camera Detector
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reprod...
Spy Detector Devices (cont’d)
Smoke Detector CameraPocket Camera Detector
EC-Council
Copyright © by EC-Council
All Rights ...
Spy Detector Devices (cont’d)
Bug Detector Set
Analog and Digital Bug Detector
Anti-wireless Camera Detector
EC-Council
Co...
Vendors Hosting Spy Devices
Spy Gadgets serious surveillance solutions
h // d /• http://www.spygadgets.com/
The Spy Tools ...
Spy Gadgets
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Tools Directory
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Amazon.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Associates
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Paramountzone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Surveillance Protection
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SpySpy
Tool
Spying Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Net Spy Pro-Computer Network
Monitoring and Protectiong
Net Spy Pro is the combination of network monitoring andpy g
admin...
Net Spy Pro-Computer Network
Monitoring and Protection: Screenshotg
EC-Council
Copyright © by EC-Council
All Rights Reserv...
SpyBoss Pro
SpyBoss Pro is an Internet monitoring and keylogger computer
software toolsoftware tool
It records all the det...
SpyBoss Pro: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CyberSpy
CyberSpy is a powerful PC monitoring and surveillance tool
It records all emails typed and viewed, chat conversat...
Spytech SpyAgent
Spytech SpyAgent is a powerful monitoring solution with tons ofSpytech SpyAgent is a powerful monitoring ...
Spytech SpyAgent: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ID Computer Spy
ID Computer Spy is designed for automatic Internet and PC
surveillancesurveillance
It records emails, Inst...
ID Computer Spy: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
e-Surveiller
e-Surveiller is a powerful user-activity monitoring, logging, and real-p y g, gg g,
time surveillance softwar...
e-Surveiller: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
KGB Spy Software
KGB Spy Software integrates several tools to ensure thorough
monitoring of computer systemsmonitoring of ...
KGB Spy Software: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
O&K Work Spy
O&K Work Spy collects the detailed statistics of what the user
d th tdoes on the computer
It i t f th t
• Wor...
O&K Work Spy: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
WebCam Spy
WebCam Spy is a useful tool for home security
Features:
• Automatic video recording
• Automatically adjust soun...
WebCam Spy: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Golden Eye
Golden Eye tool tells you about the victim’s activities onGolden Eye tool tells you about the victim s activiti...
Golden Eye: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
A ti S i T lAnti-Spying Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Internet Spy Filter
In real time it blocks spyware web bugs worms cookies ads scriptsIn real time, it blocks spyware, web ...
Internet Spy Filter: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibi...
Spybot - S&D
Spybot - S&D is an adware and spyware detection and removal tool
It detects various keylogging and other spy ...
Spybot - S&D: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SpyCop
SpyCop finds spy programs such as Spector designed
f ll d l d dspecifically to record your screen, email, passwords...
SpyCop: Screenshots
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spyware Terminator
Spyware Terminator is a full-featured adware and spyware scanner
with real time protectionwith real-tim...
Spyware Terminator: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibit...
XoftSpySE
XoftSpySE is a spyware detection scanning and removalXoftSpySE is a spyware detection, scanning and removal
tool...
XoftSpySE: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Spying is a technique to continuously monitor the computer or theSpying is a technique to continuously monitor the...
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Upcoming SlideShare
Loading in...5
×

Ce hv6 module 47 spying technologies

136

Published on

Ce hv6 module 47 spying technologies

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
136
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ce hv6 module 47 spying technologies

  1. 1. Ethical Hacking and Countermeasures Version 6 Module XLVIIModule XLVII Spying Technologies
  2. 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.chinapost.com.tw/print/144096.htm
  3. 3. Module Objective This module will familiarize you with: • Spying i f i• Motives of spying • Spying Devices • Spying Tools • Anti-Spying Toolst Spy g oo s EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  4. 4. Module Flow SpyingSpying Motives of spying Spying Devices Motives of spying Spying Devices S i T lSpying Tools A i S i T l EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spying Tools
  5. 5. Spying Spying is a method of observing a person’s activities without his/her knowledge In the computer arena spying is a technique used to continuouslyIn the computer arena, spying is a technique used to continuously monitor the computer or the network • It is used by the crackers to know the work done by the user on a ti l tparticular computer • Spying does not corrupt or hack the data but uses the data according to the spy’s interest Hidd i d d i d bHidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Such spyware devices can be used for corporate espionage
  6. 6. Motives of Spying MoneyMoney • The main intention of spying is the financial gain Individual conflicts • To take revenge due to some personal orTo take revenge due to some personal or organizational conflicts Information • To get the information which will be useful for the outsider in future EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  7. 7. Spying Devices EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  8. 8. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://newsinfo.inquirer.net/
  9. 9. Spying Using Cams Spy cams are used to spy on the intended individualsSpy ca s a e used to spy o t e te ded d dua s visually As these cameras are very tiny in size, they are not detectable through the naked eyes These cams sometimes also record voice with the help of a microphone which allows you to check even from a far distancea a d sta ce Spy cams may be kept in different objects such as, l h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pens, goggles, watches etc.
  10. 10. Video Spy Video spying is used to spy continuously on any particular bj tperson or object Video spy cams come with audio enabled feature Night vision video cams help to take the videos at the time of low lightg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  11. 11. Video Spy Devices Ultra Mini Pencil Eraser Sized Video transmitter and receiver Pinhole Video Camera Video transmitter and receiver Video spy camera on the remote car Smoke detector concealing hidda hidden camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  12. 12. Video Spy Devices (cont’d) Car-Video-Recorder(LM-CVR2)Digital Video Recorder/Player EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  13. 13. Video Spy Devices (cont’d) Wireless video camera Lighter based Video camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  14. 14. Video Spy Devices (cont’d) Rocket spy with Digital VideoBelt Buckle Video Spy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  15. 15. Tiny Spy Video Cams Screw Spy Camera with Sound Tiny video camera that can slip into a pack of cigarettes or bubblegum wrapper Sou d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  16. 16. Tiny Spy Video Cams (cont’d) Wireless spy video camPin hole spy camera Miniature Digital camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  17. 17. Underwater Video Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  18. 18. Camera Spy Cameras can be used to spy on any particularpy y p person or object and take snapshots for it S h th t t kSome cameras have sensors that take a snapshot when anything moves in front of it which is useful to secure a particular area Snapshots can be taken for a particular instant of time which can be set Night vision cams help to take the snapshots at the night time EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited the night time
  19. 19. Camera Spy Devices (cont’d) Blow dryer spy camera Hidden Camera Desk Lamp Micro dot Camera Subminiature Spy Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  20. 20. Camera Spy Devices (cont’d) Spy Tie With Built In High Buttonholed Spy Camera Spy Tie With Built-In High- Resolution Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  21. 21. Camera Spy Devices (cont’d) Button Camera KitSecret Smoker Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  22. 22. Camera Spy Devices (cont’d) Wireless Hidden Spy Cameras Bullet Pinhole Spy Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  23. 23. Goggle Spy Under water digital camera mask records under water videos and audio Spy sunglass video camera records under water videos and audio py g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  24. 24. Watch Spy Watch consists of small analogue camera It consists of LCD camera with RUIM card used in GSM phones Miniature watch built in with spy camera The spy camera is a touch screen LCD display EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  25. 25. Pen Spy Wireless camera spy pen Spy pen with built in USB interface and a card reader SD/MMC Spy pen digital voice recorder EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  26. 26. Binoculars Spy Digital binoculars spy camera that records video clips Digital Camera Binoculars Long distance surveillance digital camera Spy camera with LCD screen EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  27. 27. Toy Spy Wireless Mini SpyCamThis spy plane is used to trace the enemy movement EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  28. 28. Toy Spy (cont’d) Remote control car with built in web cameraInfrared video cam spy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  29. 29. Spy Helicopter EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  30. 30. Wireless Spy Camera Wireless spy camera draws the power from fluorescent light tubesfluorescent light tubes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  31. 31. Spy Kit Button Camera / Screw Set - CMOS C l H d i d It spies through wall device CMOS Color Hardwired p g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  32. 32. Spy Scope: Spy Telescope and MicroscopeMicroscope Spy Scope is a combined telescope and microscope in one pocket sized packagesized package Features: • Spying operations such as people watching • Suspicious activity at long distances EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  33. 33. Spy Eye Side Telescope L k t i ht h d dLook straight ahead and you can view the object at your side EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  34. 34. Audio Spy Spying on any individual with the help of audio recorder’sSpying on any individual with the help of audio recorder s It records the conversation done by some peopleIt records the conversation done by some people They are of tiny micro phones which is nearly impossible to detect by the naked eyedetect by the naked eye EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  35. 35. Audio Spy Devices MicroDot super mini digital audio recorder Spy Microphone Listening Deviceaudio recorder Matchstick LapelMatchstick Lapel Microphone Digital Voice Watch Recorder Mini Shotgun Spy Microphone f di illfor Audio Surveillance EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  36. 36. Audio Spy Devices (cont’d) h i hShotgun Microphone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  37. 37. Eavesdropper Listening Device This EAR SPY listening device is used for eavesdropping on any distant conversation It uses a ear mounted tiny amplifier to increase the level of ambient sound It allows to eavesdrop on conversations discreetly upto 80 feet away EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  38. 38. GPS Devices GPS device in Shoes GPS Tracking Device EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  39. 39. GPS Devices (cont’d) GPS Watch Trackstick GPS data logger EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  40. 40. Spy Detectors Spy detectors are used to spy detect delete and recoverSpy detectors are used to spy, detect, delete, and recover spywares It consists of a database of most commonly found spywaresIt consists of a database of most commonly found spywares which is used to delete the spywares immediately It encrypts all confidential files and folders to provideyp p complete safety EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  41. 41. Spy Detector Devices Bug DetectorAnti-Spy Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  42. 42. Spy Detector Devices (cont’d) Smoke Detector CameraPocket Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  43. 43. Spy Detector Devices (cont’d) Bug Detector Set Analog and Digital Bug Detector Anti-wireless Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  44. 44. Vendors Hosting Spy Devices Spy Gadgets serious surveillance solutions h // d /• http://www.spygadgets.com/ The Spy Tools Directory • http://www.spy-tools-directory.com/index.htmlp // py y / Amazon.com • http://www.amazon.com/b?ie=UTF8&node=166205011 Spy Associates spy equipments • http://www.spyassociates.com/ Paramountzone 007 spy gadgetsParamountzone 007 spy gadgets • http://www.paramountzone.com/globalear-spy-gadget.htm Hi-tech surveillance Spy gadgets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • http://www.spygearco.com/spy-gadgets.htm
  45. 45. Spy Gadgets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  46. 46. Spy Tools Directory EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  47. 47. Amazon.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  48. 48. Spy Associates EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  49. 49. Paramountzone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  50. 50. Surveillance Protection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  51. 51. SpySpy Tool Spying Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  52. 52. Net Spy Pro-Computer Network Monitoring and Protectiong Net Spy Pro is the combination of network monitoring andpy g administration software tool suite N k S S f k d i l l hiddNetwork Spy Software runs on networks and is completely hidden to others within the network The user accesses the activity logs via a hidden and password protected interface EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  53. 53. Net Spy Pro-Computer Network Monitoring and Protection: Screenshotg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  54. 54. SpyBoss Pro SpyBoss Pro is an Internet monitoring and keylogger computer software toolsoftware tool It records all the details of what is done on the computer and records it It uses advanced surveillance screen snapshot features It gives step by step order of the computer utility by the user EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  55. 55. SpyBoss Pro: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  56. 56. CyberSpy CyberSpy is a powerful PC monitoring and surveillance tool It records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even desktop snapshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  57. 57. Spytech SpyAgent Spytech SpyAgent is a powerful monitoring solution with tons ofSpytech SpyAgent is a powerful monitoring solution with tons of features and configuration options It records keystrokes, windows opened, applications run, passwords used, Internet connections, websites visited, emails sent and received, and even captures screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  58. 58. Spytech SpyAgent: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  59. 59. ID Computer Spy ID Computer Spy is designed for automatic Internet and PC surveillancesurveillance It records emails, Instant Message chats, web sites visited, as well as program's activities Features: • Monitors Internet activities and website viewing • Registers PC actions and launched• Registers PC actions and launched applications • Records Keystrokes • Offers password protection for log files id i i i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Provides a warning monitoring screen
  60. 60. ID Computer Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  61. 61. e-Surveiller e-Surveiller is a powerful user-activity monitoring, logging, and real-p y g, gg g, time surveillance software package Computers can be monitored on a standalone computer, on a local area network, and on remote computers across the Internet EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  62. 62. e-Surveiller: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  63. 63. KGB Spy Software KGB Spy Software integrates several tools to ensure thorough monitoring of computer systemsmonitoring of computer systems It keeps track of every word or keystroke command entered by a user and the website visitedand the website visited It monitors the clipboard and records all pasted items Features: • Stealth mode and visible mode of work • Custom list of monitored applications EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Reports over e-mail and FTP connection
  64. 64. KGB Spy Software: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  65. 65. O&K Work Spy O&K Work Spy collects the detailed statistics of what the user d th tdoes on the computer It i t f th t • Work Spy Service receives statistics from It consists of three components: Work Spy Service receives statistics from the client module and saves it to the database • Work Spy Client is a small client part that must be installed on each computer of themust be installed on each computer of the employee whose comparative statistics you want to collect • Work Spy Control Program is used to EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited py g get and analyze the statistics
  66. 66. O&K Work Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  67. 67. WebCam Spy WebCam Spy is a useful tool for home security Features: • Automatic video recording • Automatically adjust sound volume • Automatic snapshot saving in BMP d JPEG fBMP and JPEG format • Runs external application after motion is detected EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  68. 68. WebCam Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  69. 69. Golden Eye Golden Eye tool tells you about the victim’s activities onGolden Eye tool tells you about the victim s activities on the computer It spies: • Keystrokes (username & password) • Websites Visited Wi d Titl f P• Window Title of Programs • File and Folder Operation • Screenshot • Exe File Path EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Exe File Path
  70. 70. Golden Eye: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  71. 71. A ti S i T lAnti-Spying Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  72. 72. Internet Spy Filter In real time it blocks spyware web bugs worms cookies ads scriptsIn real time, it blocks spyware, web bugs, worms, cookies, ads, scripts to protect from being profiled and tracked It acts like a firewall to protect online privacy and security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  73. 73. Internet Spy Filter: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  74. 74. Spybot - S&D Spybot - S&D is an adware and spyware detection and removal tool It detects various keylogging and other spy utilities It securely removes PC and Internet usage tracks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  75. 75. Spybot - S&D: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  76. 76. SpyCop SpyCop finds spy programs such as Spector designed f ll d l d dspecifically to record your screen, email, passwords, and much more Features: • Stops Password Theft Dead: It detects spy software that is put on your computer to capture your passwords • Keeps Your Emails Private: It alerts you if your emails are being snooped by spy software • Kills Instant Message & Chat Spy Software: It keeps your online chats and instant messages safe from prying eyes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited online chats and instant messages safe from prying eyes
  77. 77. SpyCop: Screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  78. 78. Spyware Terminator Spyware Terminator is a full-featured adware and spyware scanner with real time protectionwith real-time protection It offers manual and scheduled scans The scan behavior can be customized EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  79. 79. Spyware Terminator: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  80. 80. XoftSpySE XoftSpySE is a spyware detection scanning and removalXoftSpySE is a spyware detection, scanning and removal tool, protecting you from unwanted Spyware Features: • Complete PC scanning • Removes ALL Spyware Parasites, unwanted Toolbars, and Browser HijacksHijacks • Prevents identity and credit card theft EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  81. 81. XoftSpySE: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  82. 82. Summary Spying is a technique to continuously monitor the computer or theSpying is a technique to continuously monitor the computer or the network and record all the web pages that are visited S i i d h i f i hi h ill b f l f hSpying is used to get the information which will be useful for the outsider in future Network spying monitors the web page accessed on the computer and makes a chronological record of the visited URL’s SpyCop finds spy programs such as Spector designed specifically to record your screen, email, passwords, and much more EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  83. 83. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  84. 84. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×