Reproduction is Strictly ProhibitedCopyright © byEC-CouncilVideo Spy Devices Ultra Mini Pencil Eraser Sized Pinhole Video Camera Video spy camera on the remote car Smoke detector conceal
Trang 1Ethical Hacking and Countermeasures Version 6
Module XLVIISpying Technologies
Ethical Hacking and Countermeasures v6
Module XLVII: Spying Technologies
Exam 312-50
Trang 2EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
2000 Chinese authorities started monitoring his activities after suspicions arose from his ties with Taiwan They recently arrested him after seven years of observation Since 1991, he is the third official arrested by China on charges of espionage for the island (Taiwan)
Trang 3EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Trang 4EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Module Flow
Spying
Spying Devices Motives of spying
Spying Tools
Anti-Spying Tools
Module Flow
Trang 5EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
• Spying does not corrupt or hack the data but uses the data according
to the spy’s interest Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security
• Such spyware devices can be used for corporate espionage
Spying
Spying is the method of observing a person’s activities without his/her knowledge Spying techniques are used to continuously monitor other’s computer or the network and record all the applications on it Attackers use this technique to know the work done by the user on the particular system There are many software programs that can assist spying and be installed on the victim’s computer without his/her knowledge These programs allow an unauthorized person to secretly monitor and record all the information performed on the computer
Spy software can keep track of all the applications viewed by the user, the files and documents opened, the web pages accessed, and also the instant messages sent The spy software takes the screen shots of all the applications opened by the user and sends these screenshots over the Internet without the knowledge of the user
Attackers can install the spy software’s into the user’s computer if they have physical or Internet access to the computer The intruders can hack the computer from a different location through the Internet or they can send attachments of the spyware software, which once opened by the user, will install automatically and spies the computer
Spying is not intended to corrupt or damage the system, but keeps the track of the user’s transactions and will use it if the information is useful to them or to ruin the reputation of a person by taking the information present in his computer
Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security, which can be used for corporate espionage The camera can function during the nighttime and at low light conditions
Trang 6EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Individual conflicts:
Spying can also be possible if there is any conflict or hostility with other person, or any religious, and national differences with others If an attacker intends to damage the individual’s reputation in the organization, then the individual can be spied for important data about the company
Information:
Critical information if lost can cause huge losses to the company Attackers spy on the victim’s computer for information related to the organization, critical projects, organization structure, sensitive documents, etc
Trang 7EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spying Devices
Trang 8EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spying Using Cams
Spy cams are used to spy on the intended individuals visually
As these cameras are very tiny in size, they are not detectable through the naked eyes
These cams sometimes also record voice with the help
of a microphone which allows you to check even from
a far distance
Spy cams may be kept in different objects such as, pens, goggles, watches etc.
Spying Using Cams
Spy cams are used for hidden security surveillance They are used to spy on any individual to get the intended information, or to learn about an individual’s activities Spy cams are hidden cameras of tiny size and are undetectable Spy cameras are mainly used by cops for security purpose to spy on the people set to damage the nation Most of the people also use spy cams for home security, while spies use it to spy on an individual to steal his/her personal and financial information
Spy cams come with both audio and video recording capabilities, enabling the spy to detect the individual’s movements and their voice
Trang 9EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Video Spy
Video Spy captures each and every action of the person being spied
Features:
Video spying is used to spy continuously on any particular person or object
Video spy cams come with audio enabled feature
Night vision video cams help to take the videos at the time of low light
Trang 10EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Video Spy Devices
Ultra Mini Pencil Eraser Sized Pinhole Video Camera
Video spy camera on the remote car
Smoke detector concealing
a hidden camera
Video transmitter and receiver
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Video Spy Devices (cont’d)
Car-Video-Recorder LM-CVR2 Digital Video Recorder/Player
Trang 11EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Video Spy Devices (cont’d)
Rocket spy with Digital Video Belt Buckle Video Spy
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Tiny Spy Video Cams
Tiny video camera that can slip into a pack of cigarettes or bubblegum wrapper
Screw Spy Camera with Sound
EC-Council
All Rights Reserved Reproduction is Strictly Prohibited
Tiny Spy Video Cams (cont’d)
Wireless spy video cam
Miniature Digital camera
Pin hole spy camera
Trang 12EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Underwater Video Camera
Trang 13EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Snapshots can be taken for a particular instant
of time which can be set
Night vision cams help to take the snapshots at the night time
Camera Spy
Camera Spy uses the photography method to spy on individuals Pictures are taken at regular intervals.Features:
Cameras can be used to spy on any one particular person or object and take snapshots of it
Some cameras have sensors that take a snapshot when anything moves in front of it, which is useful to secure a particular area
Snapshots can be taken for a particular instant of time, which can be set
Night vision cams help to take the snapshots at the nighttime
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Camera Spy Devices (cont’d)
Blow dryer spy camera Hidden Camera Desk Lamp
Micro dot Camera Subminiature Spy Camera
Trang 14EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Camera Spy Devices (cont’d)
Buttonholed Spy Camera Spy Tie With Built-In High-Resolution Camera
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Camera Spy Devices (cont’d)
Button Camera Kit Secret Smoker Camera
Trang 15EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Goggle Spy
Under water digital camera mask records under water videos and audio
Spy sunglass video camera
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Wireless camera spy pen Spy pen with built in USB interface
and a card reader SD/MMC
Spy pen digital voice recorder
Trang 16EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
All Rights Reserved Reproduction is Strictly Prohibited
Toy Spy (cont’d)
Remote control car with built in web camera Infrared video cam spy
Trang 17EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spy Helicopter
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Wireless Spy Camera
Wireless spy camera draws the power from fluorescent light tubes
Trang 18-EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spy Scope: Spy Telescope and
Microscope
Spy Scope is a combined telescope and microscope in one pocket sized package
Features:
• Spying operations such as people watching
• Suspicious activity at long distances
Spy Scope: Spy Telescope and Microscope
The Spy Scope comes with the combination of telescope and microscope in just a small size package It can be fixed inside the pocket as a pen It is used to view and monitor all the activities from a long distance
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spy Eye Side Telescope
Look straight ahead and you can view the object at your side
Trang 19EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Audio Spy
Spying on any individual with the help of audio recorder’s
It records the conversation done by some people
They are of tiny micro phones which is nearly impossible to detect by the naked eye
Audio Spy
Audio Spy records the voices of people who are being spied on
Features:
Spying on any individual with the help of audio recorders
It records the conversation of the people
They are tiny microphones, which are not detectable by the naked eye
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Audio Spy Devices
MicroDot super mini digital audio recorder
Spy Microphone Listening Device
Digital Voice Watch Recorder Mini Shotgun Spy Microphone
for Audio Surveillance Matchstick Lapel
Microphone
Trang 20EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Audio Spy Devices (cont’d)
Shotgun Microphone
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Eavesdropper Listening Device
This EAR SPY listening device is used for eavesdropping on any distant conversation
It uses a ear mounted tiny amplifier to increase the level of ambient sound
It allows to eavesdrop on conversations discreetly upto 80 feet away
Eavesdropper Listening Device
The EAR SPY is a listening device that is used to eavesdrop the conversation The ear mounted amplifier
is used to increase the volume in the room It gives the best results when the microphone hole directs towards the source of the sound
Trang 21EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
GPS Devices
GPS device in Shoes GPS Tracking Device
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Trang 22EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spy detectors are used to spy, detect, delete, and recover spyware
It consists of a database of most commonly found spyware, which are useful for deleting spyware immediately
It encrypts all confidential files and folders
Trang 23EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spy Detector Devices
Bug Detector Anti-Spy Camera Detector
EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Spy Detector Devices (cont’d)
Smoke Detector Camera Pocket Camera Detector
EC-Council
All Rights Reserved Reproduction is Strictly Prohibited
Spy Detector Devices (cont’d)
Analog and Digital Bug Detector Bug Detector Set
Anti-wireless Camera Detector
Trang 24EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Vendors Hosting Spy Devices
Spy Gadgets serious surveillance solutions
• http://www.spygadgets.com/
The Spy Tools Directory
• http://www.spy-tools-directory.com/index.html Amazon.com
• http://www.amazon.com/b?ie=UTF8&node=166205011 Spy Associates spy equipments
• http://www.spyassociates.com/
Paramountzone 007 spy gadgets
• http://www.paramountzone.com/globalear-spy-gadget.htm Hi-tech surveillance Spy gadgets
• http://www.spygearco.com/spy-gadgets.htm
Vendors Hosting Spy Devices
The vendors hosting the spy devices are listed below:
Spy Gadgets: serious surveillance solutions
Trang 26EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
Net Spy Pro-Computer Network Monitoring and Protection
Net Spy Pro is the combination of network monitoring and administration software tool suite
Network Spy Software runs on networks and is completely hidden to others within the network
The user accesses the activity logs via a hidden and password protected interface
Net Spy Pro-Computer Network Monitoring and Protection
Source: http://www.monitor-your-network.com/netspypro.html
Net Spy Pro is the ultimate combination network monitoring and administration software tool suite Network Monitoring Spy Software is a software tool that discreetly monitors an entire TCP/IP network It records keystrokes and takes snapshots at intervals set by the user
Network Spy Software runs on networks and is completely hidden from others within the network The user accesses the activity logs via a hidden and password protected interface This allows the user to see exactly what others were doing while they were logged into the network
Features:
Network Spy Software views remote desktop
It views recent documents
It views password cache
It views open ports
It has activity recorder for all workstations
Administrative tasks can be performed on all workstations
Trang 27EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council
It uses advanced surveillance screen snapshot features
It gives step by step order of the computer utility by the user
SpyBoss Pro
Source: http://www.gearboxcomputers.com/products/spyboss/
SpyBoss Pro is a keylogger, computer, and Internet monitoring software tool It records every detail of the computer’s activities such as chats, instant messages, emails, web sites visited, and what is searched for in the computer It also uses advanced surveillance screen snapshot features, which lets the attacker know the exact order in which they do it, step by step
Features:
Secretly monitor: SpyBoss Pro secretly monitors keystrokes, screenshots, email, instant messaging, chatting, websites visited, passwords and usernames, programs run, and much more
Password protection: SpyBoss can be set to use a password to prevent access to the program
Stealth mode: Run SpyBoss Pro’s invisible stealth-mode to prevent computer users from knowing it’s existence
Encrypt data files: Monitored data is collected in secure encrypted files, so if anyone wants to discover a log file, he/she would not be able to read it
Email log files: It monitors the computer remotely and secretly sends encrypted log files to an email address at specified intervals
Record usernames and passwords: It views usernames & password for websites, chat programs, online email, etc