Thứ Ba, 29 tháng 4, 2014

System Hacking - p.15

Lab 14
User System Monitoring and Surveillance Needs Using Spytech SpyAgent

Spytech SpyAgent is powerful computer spy sojhrare that allons yon to monitor everything users do on your computer, in total stealth. SpyAgent provides a large array of essential computer monitoring features, as well as website, application, and chat client blocking, lockdown scheduling, and remote delivery of logs via email or FTP.

Lab Scenario

Today, employees are given access to computer, telephone, and other electronic communication equipment. Email, instant messaging, global positioning systems, telephone systems, and video cameras have given employers new ways to monitor the conduct and performance of their employees. Many employees also are given laptop computer and wireless phones they can take home and use for business outside the workplace. Whether an employee can claim a reasonable expectation of privacy when using such company-supplied equipment in large part depends upon the steps die employer has made to minimize that expectation. in tins lab, we explain monitoring employee or suident activity using Spytech SpyAgent.

Lab Objectives

The objective of tins lab is to help smdents use Spytech and the SpyAgent tool. After completing tins lab, smdents will be able to:
■ Install and configure Spytech SpyAgent
■ Monitor keystrokes typed, websites visited, and Internet Traffic Data

Lab Environment

To perform the lab, you need

■ A computer running Windows Server 2012
■ Administrative pnvileges to install and mn tools
■ Run tins tool in Windows Server 2012
■ You can also download Spytech SpyAgent from http://www.spytechweb. com/spyagent.shtml
■ II you decided to download the latest version, screenshots may differ

Lab Duration

Time: 15 Minutes

Overview of Spytech SpyAgent

SpyAgent is a powerful solution diat can log all keystrokes, emails, windows, websites, applications, Internet connections, chat conversations, passwords, print jobs, documents viewed, and even screenshots. SpyAgent runs 111 complete stealth with optional email delivery and logging and lockdown scheduling. SpyAgent also features powerful filtering and access control featares, such as Chat Blocking (to restnct access to chat software), Application Blocking (to prevent specific applications from being executed), and Website Filtering.

Lab Tasks

The basic idea in diis section is to:
1. Navigate to D:\CEH-Tools\CEHv8 Module 05 System Hacking\Keyloggers\Spytech SpyAgent
2. Double-click Setup.exe. You will see die following window. Click Next.

FIGURE 14.1: Installation of Spytech SpyAgent
3. Tlie Welcome wizard of Spytech SpyAgent setup program window appears; read die instructions and click Next.

FIGURE 14.2: Installation wizard of Spytech SpyAgent
4. Tlie Important Notes window appears, read die note and click Next

FIGURE 14.3: Installation wizard
5. The Software License Agreement window appears; you must accept the agreement to install Spytech SpyAgent.
6. Click Yes to continue.
FIGURE 14.4: Select the Agreem
7. Choose die Destination Location to install Spytech SpvAgent.
8. Click Next to continue installation.

FIGURE 14.5: Selecting folder for installation
9. Select SpyAgent installation type, and select Administrator/Tester die setup type.
10. Click Next.

FIGURE 14.6: selecting installation type
11. The Ready to Install window appears. Click Next to start installing Spvtech SpyAgent.

FIGURE 14.7: Ready to install window
12. It will prompt for include an uninstaller. Click Yes.

FIGURE 14.8: Selecting an uninstaller
13. A Notice For Antivirus Users window appears; read die text click Next

FIGURE 14.9: Accept Antivirus notice

14. The Finished window appears. Click Close to end the setup.

FIGURE 14.10: Finish window
15. The following window appears. Click click to continue...

FIGURE 14.11: Welcome SpyAgent wi
16. The following window appears. Enter the password in New Password field, and retype the same password in Confirm field.
17. Click OK.

FIGURE 14.12: Selecting New Password
18. The following window appears. Click click to continue.

FIGURE 14.13: Welcome SpyAgent window
19. Configuration package wizard appears. Select the Complete + Stealth Configuration package.
20. Click Next

FIGURE 14.14: Selecting configuration package
21. Choose additional options, and select the Display Alert on Startup check box.
22. Click Next.
FIGURE 14.15: Selecting additional option
23. The Confirm Settings wizard appears. To continue click Next

FIGURE 14.16: Confimi setting wizard
24. Tlie Configurations Applied window appears. Click Next

FIGURE 14.17: Configuration applied window

25. The Configuration Finished window appears. Click Finish to successfully set up SpyAgent

FIGURE 14.18: Configuration finished window
26. The main window of Spytech SpyAgent appears, as show in the following tigure. Click Click to continue...
FIGURE 14.19: Main window of SpyAgent
27. To check the general user activities, click Start Monitoring
FIGURE 14.20: Start monitoing
28. When the Enter A c c e ss Password window appears, enter the password.
29. Click OK.

FIGURE 14.21: Entering the password
30. Stealth Notice window appears, read the instructions click OK NOTE : To bring SpyAgent out of stealth mode, press CONTROL+SHIFT+ALT+M on your keyboard.

FIGURE 14.22: Stealth mode notice
31. It will show the following window, with the options select Do not show this Help Tip again and select Do not show Related Help Tips like this again. Click click to continue...

FIGURE 14.23: Start monitoing
32. Now browse the Internet (anything). To bring spyAgent out ot stealth mode press CONTROL+SHIFT+ALT+M on your keyboard.
33. It will ask for the Access Password; enter the password and click OK.

FIGURE 14.24: Entering the password
34. To check user keystrokes from the keyboard, click Keystrokes Typed Irom General User Activities.

35. It will show all the resulting keystrokes as shown in the following screenshot

FIGURE 14.25: Resulted keystrokes
36. To check the websites visited by the user, click Website Visited from Internet Activities.

37. It will show all the user visited websites results, as shown in the following screenshot



Lab Analysis
Analyze and document the results related to the lab exercise. Give your opinion on your target’s security posture and exposure





















































































Không có nhận xét nào:

Đăng nhận xét