1. Trang chủ
  2. » Công Nghệ Thông Tin

CEHv6 module 47 spying technologies

48 133 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Spying Technologies
Trường học EC-Council
Chuyên ngành Cybersecurity
Thể loại bài luận
Năm xuất bản N/A
Thành phố N/A
Định dạng
Số trang 48
Dung lượng 2,72 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Reproduction is Strictly ProhibitedCopyright © byEC-CouncilVideo Spy Devices Ultra Mini Pencil Eraser Sized Pinhole Video Camera Video spy camera on the remote car Smoke detector conceal

Trang 1

Ethical Hacking and Countermeasures Version 6

Module XLVIISpying Technologies

Ethical Hacking and Countermeasures v6

Module XLVII: Spying Technologies

Exam 312-50

Trang 2

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

2000 Chinese authorities started monitoring his activities after suspicions arose from his ties with Taiwan They recently arrested him after seven years of observation Since 1991, he is the third official arrested by China on charges of espionage for the island (Taiwan)

Trang 3

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Trang 4

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Module Flow

Spying

Spying Devices Motives of spying

Spying Tools

Anti-Spying Tools

Module Flow

Trang 5

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

• Spying does not corrupt or hack the data but uses the data according

to the spy’s interest Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security

• Such spyware devices can be used for corporate espionage

 Spying

Spying is the method of observing a person’s activities without his/her knowledge Spying techniques are used to continuously monitor other’s computer or the network and record all the applications on it Attackers use this technique to know the work done by the user on the particular system There are many software programs that can assist spying and be installed on the victim’s computer without his/her knowledge These programs allow an unauthorized person to secretly monitor and record all the information performed on the computer

Spy software can keep track of all the applications viewed by the user, the files and documents opened, the web pages accessed, and also the instant messages sent The spy software takes the screen shots of all the applications opened by the user and sends these screenshots over the Internet without the knowledge of the user

Attackers can install the spy software’s into the user’s computer if they have physical or Internet access to the computer The intruders can hack the computer from a different location through the Internet or they can send attachments of the spyware software, which once opened by the user, will install automatically and spies the computer

Spying is not intended to corrupt or damage the system, but keeps the track of the user’s transactions and will use it if the information is useful to them or to ruin the reputation of a person by taking the information present in his computer

Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security, which can be used for corporate espionage The camera can function during the nighttime and at low light conditions

Trang 6

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Individual conflicts:

Spying can also be possible if there is any conflict or hostility with other person, or any religious, and national differences with others If an attacker intends to damage the individual’s reputation in the organization, then the individual can be spied for important data about the company

Information:

Critical information if lost can cause huge losses to the company Attackers spy on the victim’s computer for information related to the organization, critical projects, organization structure, sensitive documents, etc

Trang 7

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spying Devices

Trang 8

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spying Using Cams

Spy cams are used to spy on the intended individuals visually

As these cameras are very tiny in size, they are not detectable through the naked eyes

These cams sometimes also record voice with the help

of a microphone which allows you to check even from

a far distance

Spy cams may be kept in different objects such as, pens, goggles, watches etc.

 Spying Using Cams

Spy cams are used for hidden security surveillance They are used to spy on any individual to get the intended information, or to learn about an individual’s activities Spy cams are hidden cameras of tiny size and are undetectable Spy cameras are mainly used by cops for security purpose to spy on the people set to damage the nation Most of the people also use spy cams for home security, while spies use it to spy on an individual to steal his/her personal and financial information

Spy cams come with both audio and video recording capabilities, enabling the spy to detect the individual’s movements and their voice

Trang 9

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

 Video Spy

Video Spy captures each and every action of the person being spied

Features:

 Video spying is used to spy continuously on any particular person or object

 Video spy cams come with audio enabled feature

 Night vision video cams help to take the videos at the time of low light

Trang 10

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Video Spy Devices

Ultra Mini Pencil Eraser Sized Pinhole Video Camera

Video spy camera on the remote car

Smoke detector concealing

a hidden camera

Video transmitter and receiver

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Video Spy Devices (cont’d)

Car-Video-Recorder LM-CVR2 Digital Video Recorder/Player

Trang 11

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Video Spy Devices (cont’d)

Rocket spy with Digital Video Belt Buckle Video Spy

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Tiny Spy Video Cams

Tiny video camera that can slip into a pack of cigarettes or bubblegum wrapper

Screw Spy Camera with Sound

EC-Council

All Rights Reserved Reproduction is Strictly Prohibited

Tiny Spy Video Cams (cont’d)

Wireless spy video cam

Miniature Digital camera

Pin hole spy camera

Trang 12

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Underwater Video Camera

Trang 13

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Snapshots can be taken for a particular instant

of time which can be set

Night vision cams help to take the snapshots at the night time

 Camera Spy

Camera Spy uses the photography method to spy on individuals Pictures are taken at regular intervals.Features:

 Cameras can be used to spy on any one particular person or object and take snapshots of it

 Some cameras have sensors that take a snapshot when anything moves in front of it, which is useful to secure a particular area

 Snapshots can be taken for a particular instant of time, which can be set

 Night vision cams help to take the snapshots at the nighttime

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Camera Spy Devices (cont’d)

Blow dryer spy camera Hidden Camera Desk Lamp

Micro dot Camera Subminiature Spy Camera

Trang 14

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Camera Spy Devices (cont’d)

Buttonholed Spy Camera Spy Tie With Built-In High-Resolution Camera

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Camera Spy Devices (cont’d)

Button Camera Kit Secret Smoker Camera

Trang 15

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Goggle Spy

Under water digital camera mask records under water videos and audio

Spy sunglass video camera

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Wireless camera spy pen Spy pen with built in USB interface

and a card reader SD/MMC

Spy pen digital voice recorder

Trang 16

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

All Rights Reserved Reproduction is Strictly Prohibited

Toy Spy (cont’d)

Remote control car with built in web camera Infrared video cam spy

Trang 17

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spy Helicopter

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Wireless Spy Camera

Wireless spy camera draws the power from fluorescent light tubes

Trang 18

-EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spy Scope: Spy Telescope and

Microscope

Spy Scope is a combined telescope and microscope in one pocket sized package

Features:

• Spying operations such as people watching

• Suspicious activity at long distances

 Spy Scope: Spy Telescope and Microscope

The Spy Scope comes with the combination of telescope and microscope in just a small size package It can be fixed inside the pocket as a pen It is used to view and monitor all the activities from a long distance

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spy Eye Side Telescope

Look straight ahead and you can view the object at your side

Trang 19

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Audio Spy

Spying on any individual with the help of audio recorder’s

It records the conversation done by some people

They are of tiny micro phones which is nearly impossible to detect by the naked eye

 Audio Spy

Audio Spy records the voices of people who are being spied on

Features:

 Spying on any individual with the help of audio recorders

 It records the conversation of the people

 They are tiny microphones, which are not detectable by the naked eye

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Audio Spy Devices

MicroDot super mini digital audio recorder

Spy Microphone Listening Device

Digital Voice Watch Recorder Mini Shotgun Spy Microphone

for Audio Surveillance Matchstick Lapel

Microphone

Trang 20

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Audio Spy Devices (cont’d)

Shotgun Microphone

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Eavesdropper Listening Device

This EAR SPY listening device is used for eavesdropping on any distant conversation

It uses a ear mounted tiny amplifier to increase the level of ambient sound

It allows to eavesdrop on conversations discreetly upto 80 feet away

 Eavesdropper Listening Device

The EAR SPY is a listening device that is used to eavesdrop the conversation The ear mounted amplifier

is used to increase the volume in the room It gives the best results when the microphone hole directs towards the source of the sound

Trang 21

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

GPS Devices

GPS device in Shoes GPS Tracking Device

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Trang 22

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

 Spy detectors are used to spy, detect, delete, and recover spyware

 It consists of a database of most commonly found spyware, which are useful for deleting spyware immediately

 It encrypts all confidential files and folders

Trang 23

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spy Detector Devices

Bug Detector Anti-Spy Camera Detector

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Spy Detector Devices (cont’d)

Smoke Detector Camera Pocket Camera Detector

EC-Council

All Rights Reserved Reproduction is Strictly Prohibited

Spy Detector Devices (cont’d)

Analog and Digital Bug Detector Bug Detector Set

Anti-wireless Camera Detector

Trang 24

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Vendors Hosting Spy Devices

Spy Gadgets serious surveillance solutions

• http://www.spygadgets.com/

The Spy Tools Directory

• http://www.spy-tools-directory.com/index.html Amazon.com

• http://www.amazon.com/b?ie=UTF8&node=166205011 Spy Associates spy equipments

• http://www.spyassociates.com/

Paramountzone 007 spy gadgets

• http://www.paramountzone.com/globalear-spy-gadget.htm Hi-tech surveillance Spy gadgets

• http://www.spygearco.com/spy-gadgets.htm

 Vendors Hosting Spy Devices

The vendors hosting the spy devices are listed below:

 Spy Gadgets: serious surveillance solutions

Trang 26

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

Net Spy Pro-Computer Network Monitoring and Protection

Net Spy Pro is the combination of network monitoring and administration software tool suite

Network Spy Software runs on networks and is completely hidden to others within the network

The user accesses the activity logs via a hidden and password protected interface

 Net Spy Pro-Computer Network Monitoring and Protection

Source: http://www.monitor-your-network.com/netspypro.html

Net Spy Pro is the ultimate combination network monitoring and administration software tool suite Network Monitoring Spy Software is a software tool that discreetly monitors an entire TCP/IP network It records keystrokes and takes snapshots at intervals set by the user

Network Spy Software runs on networks and is completely hidden from others within the network The user accesses the activity logs via a hidden and password protected interface This allows the user to see exactly what others were doing while they were logged into the network

Features:

 Network Spy Software views remote desktop

 It views recent documents

 It views password cache

 It views open ports

 It has activity recorder for all workstations

 Administrative tasks can be performed on all workstations

Trang 27

EC-Council All Rights Reserved Reproduction is Strictly ProhibitedCopyright © byEC-Council

It uses advanced surveillance screen snapshot features

It gives step by step order of the computer utility by the user

 SpyBoss Pro

Source: http://www.gearboxcomputers.com/products/spyboss/

SpyBoss Pro is a keylogger, computer, and Internet monitoring software tool It records every detail of the computer’s activities such as chats, instant messages, emails, web sites visited, and what is searched for in the computer It also uses advanced surveillance screen snapshot features, which lets the attacker know the exact order in which they do it, step by step

Features:

 Secretly monitor: SpyBoss Pro secretly monitors keystrokes, screenshots, email, instant messaging, chatting, websites visited, passwords and usernames, programs run, and much more

 Password protection: SpyBoss can be set to use a password to prevent access to the program

 Stealth mode: Run SpyBoss Pro’s invisible stealth-mode to prevent computer users from knowing it’s existence

 Encrypt data files: Monitored data is collected in secure encrypted files, so if anyone wants to discover a log file, he/she would not be able to read it

 Email log files: It monitors the computer remotely and secretly sends encrypted log files to an email address at specified intervals

 Record usernames and passwords: It views usernames & password for websites, chat programs, online email, etc

Ngày đăng: 26/12/2013, 21:05

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN