Lab 15
Web Activity Monitoring and Recording Using Power Spy 2013
Lab Scenario
Today, employees are given access to computers, telephones, and other electronic communication equipment. Email, instant messaging, global positioning systems, telephone systems, and video cameras have given employers new ways to monitor the conduct and performance of their employees. ]Many employees also are given laptop computers and wireless telephones diev can take home and use for business outside die workplace. Whedier an employee can claim a reasonable expectation of privacy when using such company-supplied equipment in large part depends upon the steps die employer has made to minimize that expectation. in tins lab, we explain monitoring employee or student activity using Power Spy 2013.
Lab Objectives
The objective of tins lab is to help students use the Activity Monitor tool. After completing diis lab, students will be able to:
■ Install and configure Power Spy 2013
■ Monitor keystrokes typed, websites visited, and Internet Traffic Data
Lab Environment
To perform die lab, you need:
■ A computer running Windows Server 2012
■ Administrative privileges to install and mn tools
■ You can also download Power Spy tool from
http:/ / ematr1xsoft.com/ download-power-spy-software.php
■ If you decided to download latest version screenshots may differ
■ Run this tool 111 Windows Server 2012
Lab Duration
Time: 15 Minutes
Overview of Power Spy 2013
Power Spy software records Facebook use and all keystrokes typed, and captures all chats and INIs in Windows Live Messenger (MSN Messenger) , Skype, Yahoo Messenger, Tencent QQ, Google Talk, GADU-GADU, ICQ, AOL Instant Messenger (AIM), and odiers. It records all websites visited, emails read, documents opened, windows opened, clipboard activities, passwords typed, and applications executed.
Lab Tasks
The basic idea 111 dus section is to:
1. Navigate to D:\CEH-Tools\CEHv8 Module 05 System Hacking\Spywares\Email and Internet Spyware\Power Spy.
2. Double-click pcspy.exe. The Software License Agreement window appears. You must accept the agreement to install Power Spy.
3. Click Next in die License Agreement wizard.
FIGURE 15.1: Installation of Spytech SpyAgent |
FIGURE 15.2: Select die Agreement |
FIGURE 15.3: Selecting folder for installation |
6. Tlie Setup login password window appears. Enter the password in the New password field, and retype the same password in the Confirm password held.
7. Click Submit.
FIGURE 15.4: Selecting New Password |
8. The Information dialog box appears. Click OK.
FIGURE 15.5: password confirmation window |
10. Click Submit
FIGURE 15.6: Enter the password |
11. The Register product window appears. Click Later to continue
FIGURE 15.7: Register product window |
FIGURE 15.8: Main window o f Power Spy |
FIGURE 15.9: Start monitoring |
14. The System Reboot Recommended window appears. Click OK
FIGURE 15.10: System Reboot Recommended w in d ow |
16. The Hotkey reminder window appears. Click OK (to unhide Power Spy, use the Ctrl+Alt+X keys together on your PC keyboard).
FIGURE 15.11: Stealth mode window |
FIGURE 15.12: Stealth mode notice |
19. The Run a s administrator window appears. Click Run.
FIGURE 15.13: Rim as administra |
21. Click Submit.
FIGURE 15.14: Enter the password |
23. Click Stop monito
FIGURE 15.15: Stop the monitoring |
FIGURE 15.16: Selecting keystrokes from Power spy control panel |
26. Click the Close button.
FIGURE 15.17: Resulted keystrokes |
28. It will show all the visited websites, as shown in the following screenshot.
FIGURE 15.18: Result o f visited websites |
Analyze and document die results related to the lab exercise. Give your opinion on your target’s security posture and exposure
Không có nhận xét nào:
Đăng nhận xét