Thứ Ba, 29 tháng 4, 2014

System Hacking - p.16

Lab 15

Web Activity Monitoring and Recording Using Power Spy 2013

Power Spy 2013 sojhmre allows yon to secretly won !tor and record all activities on yonr computer, and this is completely legal.

Lab Scenario

Today, employees are given access to computers, telephones, and other electronic communication equipment. Email, instant messaging, global positioning systems, telephone systems, and video cameras have given employers new ways to monitor the conduct and performance of their employees. ]Many employees also are given laptop computers and wireless telephones diev can take home and use for business outside die workplace. Whedier an employee can claim a reasonable expectation of privacy when using such company-supplied equipment in large part depends upon the steps die employer has made to minimize that expectation. in tins lab, we explain monitoring employee or student activity using Power Spy 2013.

Lab Objectives

The objective of tins lab is to help students use the Activity Monitor tool. After completing diis lab, students will be able to:
■ Install and configure Power Spy 2013
■ Monitor keystrokes typed, websites visited, and Internet Traffic Data

Lab Environment

To perform die lab, you need:
■ A computer running Windows Server 2012
■ Administrative privileges to install and mn tools
■ You can also download Power Spy tool from
http:/ / ematr1xsoft.com/ download-power-spy-software.php

■ If you decided to download latest version screenshots may differ
■ Run this tool 111 Windows Server 2012

Lab Duration

Time: 15 Minutes

Overview of Power Spy 2013

Power Spy software records Facebook use and all keystrokes typed, and captures all chats and INIs in Windows Live Messenger (MSN Messenger) , Skype, Yahoo Messenger, Tencent QQ, Google Talk, GADU-GADU, ICQ, AOL Instant Messenger (AIM), and odiers. It records all websites visited, emails read, documents opened, windows opened, clipboard activities, passwords typed, and applications executed.

Lab Tasks

The basic idea 111 dus section is to:

1. Navigate to D:\CEH-Tools\CEHv8 Module 05 System Hacking\Spywares\Email and Internet Spyware\Power Spy.
2. Double-click pcspy.exe. The Software License Agreement window appears. You must accept the agreement to install Power Spy.
3. Click Next in die License Agreement wizard.

FIGURE 15.1: Installation of Spytech SpyAgent
4. Setup has finished the installation on the system. Click Finish.

FIGURE 15.2: Select die Agreement
5. The Run a s administrator window appears. Click Run

FIGURE 15.3: Selecting folder for installation

6. Tlie Setup login password window appears. Enter the password in the New password field, and retype the same password in the Confirm password held.
7. Click Submit.
FIGURE 15.4: Selecting New Password

8. The Information dialog box appears. Click OK.

FIGURE 15.5: password confirmation window
9. The Enter login Password window appears. Enter the password  (which is already set).
10. Click Submit

FIGURE 15.6: Enter the password

11. The Register product window appears. Click Later to continue

FIGURE 15.7: Register product window
12. The main window o f Power Spy appears, as displayed in die following figure.

FIGURE 15.8: Main window o f Power Spy
13. Click Start monitoring

FIGURE 15.9: Start monitoring

14. The System Reboot Recommended window appears. Click OK
FIGURE 15.10: System Reboot Recommended w in d ow
15. Click Stealth Mode (stealth mode runs the Power Spy completely invisibly on the computer) .
16. The Hotkey reminder window appears. Click OK (to unhide Power Spy, use the Ctrl+Alt+X keys together on your PC keyboard).

FIGURE 15.11: Stealth mode window
17. The Confirm window appears Click Yes.

FIGURE 15.12: Stealth mode notice
18. Now browse the Internet (anytiling). To bring Power Spy out of stealth mode, press CONTROL+ALT+X on your keyboard.

19. The Run a s administrator window appears. Click Run.

FIGURE 15.13: Rim as administra
20. The Enter login password window appears. Enter the password (which is already set) .
21. Click Submit.

FIGURE 15.14: Enter the password
22. Click Later in the Register product window to continue if it appears.
23. Click Stop monito

FIGURE 15.15: Stop the monitoring
24. To check user keystrokes from the keyboard, click Keystrokes in Power Spy Control Panel.

FIGURE 15.16: Selecting keystrokes from Power spy control panel
25. It will show all the resulted keystrokes as shown in the following screenshot.

26. Click the Close button.

FIGURE 15.17: Resulted keystrokes
27. To check the websites visited by the user, click Website visited in the Power Spy Control Panel.
28. It will show all the visited websites, as shown in the following screenshot.

FIGURE 15.18: Result o f visited websites
Lab Analysis
Analyze and document die results related to the lab exercise. Give your opinion on your target’s security posture and exposure


















































































































Không có nhận xét nào:

Đăng nhận xét