ce hv6 module 47 spying technologies

84
Ethical Hacking and Countermeasures Version 6 Module XLVII Module XLVII Spying Technologies

Upload: vi-tinh-hoang-nam

Post on 19-May-2015

102 views

Category:

Technology


0 download

DESCRIPTION

Ce hv6 module 47 spying technologies

TRANSCRIPT

Page 1: Ce hv6 module 47 spying technologies

Ethical Hacking and Countermeasures Version 6

Module XLVIIModule XLVII

Spying Technologies

Page 2: Ce hv6 module 47 spying technologies

News

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://www.chinapost.com.tw/print/144096.htm

Page 3: Ce hv6 module 47 spying technologies

Module Objective

This module will familiarize you with:

• Spyingi f i• Motives of spying

• Spying Devices• Spying Tools• Anti-Spying Toolst Spy g oo s

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 4: Ce hv6 module 47 spying technologies

Module Flow

SpyingSpying

Motives of spying

Spying Devices

Motives of spying

Spying Devices

S i T lSpying Tools

A i S i T l

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Anti-Spying Tools

Page 5: Ce hv6 module 47 spying technologies

Spying

Spying is a method of observing a person’s activities without his/her knowledge

In the computer arena spying is a technique used to continuously In the computer arena, spying is a technique used to continuously monitor the computer or the network

• It is used by the crackers to know the work done by the user on a ti l tparticular computer

• Spying does not corrupt or hack the data but uses the data according to the spy’s interest

Hidd i d d i d b Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

• Such spyware devices can be used for corporate espionage

Page 6: Ce hv6 module 47 spying technologies

Motives of Spying

MoneyMoney

• The main intention of spying is the financial gain

Individual conflicts

• To take revenge due to some personal or To take revenge due to some personal or organizational conflicts

Information

• To get the information which will be useful for the outsider in future

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 7: Ce hv6 module 47 spying technologies

Spying Devices

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 8: Ce hv6 module 47 spying technologies

News

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Source: http://newsinfo.inquirer.net/

Page 9: Ce hv6 module 47 spying technologies

Spying Using Cams

Spy cams are used to spy on the intended individuals Spy ca s a e used to spy o t e te ded d dua s visually

As these cameras are very tiny in size, they are not detectable through the naked eyes

These cams sometimes also record voice with the help of a microphone which allows you to check even from a far distancea a d sta ce

Spy cams may be kept in different objects such as, l h

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

pens, goggles, watches etc.

Page 10: Ce hv6 module 47 spying technologies

Video Spy

Video spying is used to spy continuously on any particular bj tperson or object

Video spy cams come with audio enabled feature

Night vision video cams help to take the videos at the time of low lightg

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 11: Ce hv6 module 47 spying technologies

Video Spy Devices

Ultra Mini Pencil Eraser Sized Video transmitter and receiverPinhole Video Camera

Video transmitter and receiver

Video spy camera on the remote car

Smoke detector concealing hidd a hidden camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 12: Ce hv6 module 47 spying technologies

Video Spy Devices (cont’d)

Car-Video-Recorder(LM-CVR2)Digital Video Recorder/Player

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 13: Ce hv6 module 47 spying technologies

Video Spy Devices (cont’d)

Wireless video camera Lighter based Video camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 14: Ce hv6 module 47 spying technologies

Video Spy Devices (cont’d)

Rocket spy with Digital VideoBelt Buckle Video Spy

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 15: Ce hv6 module 47 spying technologies

Tiny Spy Video Cams

Screw Spy Camera with Sound

Tiny video camera that can slip into a pack of cigarettes or

bubblegum wrapper

Sou d

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 16: Ce hv6 module 47 spying technologies

Tiny Spy Video Cams (cont’d)

Wireless spy video camPin hole spy camera

Miniature Digital camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 17: Ce hv6 module 47 spying technologies

Underwater Video Camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 18: Ce hv6 module 47 spying technologies

Camera Spy

Cameras can be used to spy on any particular py y pperson or object and take snapshots for it

S h th t t k Some cameras have sensors that take a snapshot when anything moves in front of it which is useful to secure a particular area

Snapshots can be taken for a particular instant of time which can be set

Night vision cams help to take the snapshots at the night time

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

the night time

Page 19: Ce hv6 module 47 spying technologies

Camera Spy Devices (cont’d)

Blow dryer spy camera Hidden Camera Desk Lamp

Micro dot Camera Subminiature Spy Camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 20: Ce hv6 module 47 spying technologies

Camera Spy Devices (cont’d)

Spy Tie With Built In HighButtonholed Spy Camera Spy Tie With Built-In High-Resolution Camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 21: Ce hv6 module 47 spying technologies

Camera Spy Devices (cont’d)

Button Camera KitSecret Smoker Camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 22: Ce hv6 module 47 spying technologies

Camera Spy Devices (cont’d)

Wireless Hidden Spy Cameras Bullet Pinhole Spy Camera

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 23: Ce hv6 module 47 spying technologies

Goggle Spy

Under water digital camera mask records under water videos and audioSpy sunglass video camera records under water videos and audiopy g

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 24: Ce hv6 module 47 spying technologies

Watch Spy

Watch consists of small analogue camera

It consists of LCD camera with RUIM card used in GSM phones

Miniature watch built in with spy camera

The spy camera is a touch screen LCD display

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 25: Ce hv6 module 47 spying technologies

Pen Spy

Wireless camera spy pen Spy pen with built in USB interface and a card reader SD/MMC

Spy pen digital voice recorder

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 26: Ce hv6 module 47 spying technologies

Binoculars Spy

Digital binoculars spy camera that records video clips

Digital Camera Binoculars

Long distance surveillance digital camera

Spy camera with LCD screen

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 27: Ce hv6 module 47 spying technologies

Toy Spy

Wireless Mini SpyCamThis spy plane is used to trace the enemy movement

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 28: Ce hv6 module 47 spying technologies

Toy Spy (cont’d)

Remote control car with built in web cameraInfrared video cam spy

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 29: Ce hv6 module 47 spying technologies

Spy Helicopter

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 30: Ce hv6 module 47 spying technologies

Wireless Spy Camera

Wireless spy camera draws the power from fluorescent light tubesfluorescent light tubes

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 31: Ce hv6 module 47 spying technologies

Spy Kit

Button Camera / Screw Set -CMOS C l H d i d

It spies through wall deviceCMOS Color Hardwired

p g

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 32: Ce hv6 module 47 spying technologies

Spy Scope: Spy Telescope and MicroscopeMicroscope

Spy Scope is a combined telescope and microscope in one pocket sized packagesized package

Features:

• Spying operations such as people watching• Suspicious activity at long distances

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 33: Ce hv6 module 47 spying technologies

Spy Eye Side Telescope

L k t i ht h d d Look straight ahead and you can view the object at your side

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 34: Ce hv6 module 47 spying technologies

Audio Spy

Spying on any individual with the help of audio recorder’sSpying on any individual with the help of audio recorder s

It records the conversation done by some peopleIt records the conversation done by some people

They are of tiny micro phones which is nearly impossible to detect by the naked eyedetect by the naked eye

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 35: Ce hv6 module 47 spying technologies

Audio Spy Devices

MicroDot super mini digital audio recorder

Spy Microphone Listening Deviceaudio recorder

Matchstick Lapel Matchstick Lapel Microphone

Digital Voice Watch Recorder Mini Shotgun Spy Microphone

f di illfor Audio Surveillance

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 36: Ce hv6 module 47 spying technologies

Audio Spy Devices (cont’d)

h i hShotgun Microphone

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 37: Ce hv6 module 47 spying technologies

Eavesdropper Listening Device

This EAR SPY listening device is used for eavesdropping on any distant conversation

It uses a ear mounted tiny amplifier to increase the level of ambient sound

It allows to eavesdrop on conversations discreetly upto 80 feet away

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 38: Ce hv6 module 47 spying technologies

GPS Devices

GPS device in Shoes GPS Tracking Device

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 39: Ce hv6 module 47 spying technologies

GPS Devices (cont’d)

GPS Watch Trackstick GPS data logger

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 40: Ce hv6 module 47 spying technologies

Spy Detectors

Spy detectors are used to spy detect delete and recover Spy detectors are used to spy, detect, delete, and recover spywares

It consists of a database of most commonly found spywares It consists of a database of most commonly found spywares which is used to delete the spywares immediately

It encrypts all confidential files and folders to provide yp pcomplete safety

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 41: Ce hv6 module 47 spying technologies

Spy Detector Devices

Bug DetectorAnti-Spy Camera Detector

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 42: Ce hv6 module 47 spying technologies

Spy Detector Devices (cont’d)

Smoke Detector CameraPocket Camera Detector

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 43: Ce hv6 module 47 spying technologies

Spy Detector Devices (cont’d)

Bug Detector Set

Analog and Digital Bug Detector

Anti-wireless Camera Detector

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 44: Ce hv6 module 47 spying technologies

Vendors Hosting Spy Devices

Spy Gadgets serious surveillance solutionsh // d /• http://www.spygadgets.com/

The Spy Tools Directory• http://www.spy-tools-directory.com/index.htmlp // py y /

Amazon.com• http://www.amazon.com/b?ie=UTF8&node=166205011

Spy Associates spy equipments• http://www.spyassociates.com/

Paramountzone 007 spy gadgetsParamountzone 007 spy gadgets• http://www.paramountzone.com/globalear-spy-gadget.htm

Hi-tech surveillance Spy gadgets

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

• http://www.spygearco.com/spy-gadgets.htm

Page 45: Ce hv6 module 47 spying technologies

Spy Gadgets

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 46: Ce hv6 module 47 spying technologies

Spy Tools Directory

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 47: Ce hv6 module 47 spying technologies

Amazon.com

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 48: Ce hv6 module 47 spying technologies

Spy Associates

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 49: Ce hv6 module 47 spying technologies

Paramountzone

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 50: Ce hv6 module 47 spying technologies

Surveillance Protection

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 51: Ce hv6 module 47 spying technologies

SpySpyTool

Spying Tools

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 52: Ce hv6 module 47 spying technologies

Net Spy Pro-Computer Network Monitoring and Protectiong

Net Spy Pro is the combination of network monitoring and py gadministration software tool suite

N k S S f k d i l l hidd Network Spy Software runs on networks and is completely hidden to others within the network

The user accesses the activity logs via a hidden and password protected interface

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 53: Ce hv6 module 47 spying technologies

Net Spy Pro-Computer Network Monitoring and Protection: Screenshotg

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 54: Ce hv6 module 47 spying technologies

SpyBoss Pro

SpyBoss Pro is an Internet monitoring and keylogger computer software toolsoftware tool

It records all the details of what is done on the computer and records it

It uses advanced surveillance screen snapshot features

It gives step by step order of the computer utility by the user

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 55: Ce hv6 module 47 spying technologies

SpyBoss Pro: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 56: Ce hv6 module 47 spying technologies

CyberSpy

CyberSpy is a powerful PC monitoring and surveillance tool

It records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even desktop snapshots

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 57: Ce hv6 module 47 spying technologies

Spytech SpyAgent

Spytech SpyAgent is a powerful monitoring solution with tons of Spytech SpyAgent is a powerful monitoring solution with tons of features and configuration options

It records keystrokes, windows opened, applications run, passwords used, Internet connections, websites visited, emails sent and received, and even captures screenshots

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 58: Ce hv6 module 47 spying technologies

Spytech SpyAgent: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 59: Ce hv6 module 47 spying technologies

ID Computer Spy

ID Computer Spy is designed for automatic Internet and PC surveillancesurveillance

It records emails, Instant Message chats, web sites visited, as well as program's activities

Features:

• Monitors Internet activities and website viewing

• Registers PC actions and launched • Registers PC actions and launched applications

• Records Keystrokes• Offers password protection for log files

id i i i

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

• Provides a warning monitoring screen

Page 60: Ce hv6 module 47 spying technologies

ID Computer Spy: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 61: Ce hv6 module 47 spying technologies

e-Surveiller

e-Surveiller is a powerful user-activity monitoring, logging, and real-p y g, gg g,time surveillance software package

Computers can be monitored on a standalone computer, on a local area network, and on remote computers across the Internet

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 62: Ce hv6 module 47 spying technologies

e-Surveiller: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 63: Ce hv6 module 47 spying technologies

KGB Spy Software

KGB Spy Software integrates several tools to ensure thorough monitoring of computer systemsmonitoring of computer systems

It keeps track of every word or keystroke command entered by a user and the website visitedand the website visited

It monitors the clipboard and records all pasted items

Features:

• Stealth mode and visible mode of work• Custom list of monitored applications

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

• Reports over e-mail and FTP connection

Page 64: Ce hv6 module 47 spying technologies

KGB Spy Software: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 65: Ce hv6 module 47 spying technologies

O&K Work Spy

O&K Work Spy collects the detailed statistics of what the user d th tdoes on the computer

It i t f th t

• Work Spy Service receives statistics from

It consists of three components:

Work Spy Service receives statistics from the client module and saves it to the database

• Work Spy Client is a small client part that must be installed on each computer of the must be installed on each computer of the employee whose comparative statistics you want to collect

• Work Spy Control Program is used to

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

py gget and analyze the statistics

Page 66: Ce hv6 module 47 spying technologies

O&K Work Spy: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 67: Ce hv6 module 47 spying technologies

WebCam Spy

WebCam Spy is a useful tool for home security

Features:

• Automatic video recording• Automatically adjust sound

volume• Automatic snapshot saving in

BMP d JPEG fBMP and JPEG format• Runs external application after

motion is detected

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 68: Ce hv6 module 47 spying technologies

WebCam Spy: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 69: Ce hv6 module 47 spying technologies

Golden Eye

Golden Eye tool tells you about the victim’s activities on Golden Eye tool tells you about the victim s activities on the computer

It spies:

• Keystrokes (username & password)• Websites Visited

Wi d Titl f P• Window Title of Programs• File and Folder Operation• Screenshot• Exe File Path

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

• Exe File Path

Page 70: Ce hv6 module 47 spying technologies

Golden Eye: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 71: Ce hv6 module 47 spying technologies

A ti S i T lAnti-Spying Tools

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 72: Ce hv6 module 47 spying technologies

Internet Spy Filter

In real time it blocks spyware web bugs worms cookies ads scripts In real time, it blocks spyware, web bugs, worms, cookies, ads, scripts to protect from being profiled and tracked

It acts like a firewall to protect online privacy and security

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 73: Ce hv6 module 47 spying technologies

Internet Spy Filter: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 74: Ce hv6 module 47 spying technologies

Spybot - S&D

Spybot - S&D is an adware and spyware detection and removal tool

It detects various keylogging and other spy utilities

It securely removes PC and Internet usage tracks

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 75: Ce hv6 module 47 spying technologies

Spybot - S&D: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 76: Ce hv6 module 47 spying technologies

SpyCop

SpyCop finds spy programs such as Spector designed f ll d l d dspecifically to record your screen, email, passwords, and

much more

Features:

• Stops Password Theft Dead: It detects spy software that is put on your computer to capture your passwords

• Keeps Your Emails Private: It alerts you if your emails are being snooped by spy software

• Kills Instant Message & Chat Spy Software: It keeps your online chats and instant messages safe from prying eyes

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

online chats and instant messages safe from prying eyes

Page 77: Ce hv6 module 47 spying technologies

SpyCop: Screenshots

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 78: Ce hv6 module 47 spying technologies

Spyware Terminator

Spyware Terminator is a full-featured adware and spyware scanner with real time protectionwith real-time protection

It offers manual and scheduled scans

The scan behavior can be customized

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 79: Ce hv6 module 47 spying technologies

Spyware Terminator: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 80: Ce hv6 module 47 spying technologies

XoftSpySE

XoftSpySE is a spyware detection scanning and removal XoftSpySE is a spyware detection, scanning and removal tool, protecting you from unwanted Spyware

Features:

• Complete PC scanning• Removes ALL Spyware Parasites,

unwanted Toolbars, and Browser HijacksHijacks

• Prevents identity and credit card theft

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 81: Ce hv6 module 47 spying technologies

XoftSpySE: Screenshot

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 82: Ce hv6 module 47 spying technologies

Summary

Spying is a technique to continuously monitor the computer or the Spying is a technique to continuously monitor the computer or the network and record all the web pages that are visited

S i i d h i f i hi h ill b f l f h Spying is used to get the information which will be useful for the outsider in future

Network spying monitors the web page accessed on the computer and makes a chronological record of the visited URL’s

SpyCop finds spy programs such as Spector designed specifically to record your screen, email, passwords, and much more

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 83: Ce hv6 module 47 spying technologies

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited

Page 84: Ce hv6 module 47 spying technologies

EC-CouncilCopyright © by EC-Council

All Rights Reserved. Reproduction is Strictly Prohibited