Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3516 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Ethical Hacking and Countermeasures Version 6 Module XLVII Spying Technologies Ethical Hacking and Countermeasures v6 Module XLVII: Spying Technologies Exam 312-50 Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3517 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News Source: http://www.chinapost.com.tw/print/144096.htm News A Taiwan newspaper has reported that Chinese authorities have arrested former China communication ministry employees for allegedly spying for Taiwan. According to United Daily News, Li Jian, an ex-deputy director of the ministry's Taiwan Affairs Office, was arrested on Lunar New Year's eve for allegedly spying for Taiwan. In 1997, Li performed a very important role in a cross-strait agreement to launch a new system of an “offshore transport center” that enables faster shipping between Taiwan and China. He left the ministry to become a businessman, but in 2000 Chinese authorities started monitoring his activities after suspicions arose from his ties with Taiwan. They recently arrested him after seven years of observation. Since 1991, he is the third official arrested by China on charges of espionage for the island (Taiwan). Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3518 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • Spying • Motives of spying • Spying Devices • Spying Tools • Anti-Spying Tools This module will familiarize you with: Module Objective This module will familiarize you with: Spying Motives of Spying Spying Devices Spying Tools Anti-Spying Tools Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3519 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow Spying Spying Devices Motives of spying Spying Tools Anti-Spying Tools Module Flow Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3520 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Spying Spying is a method of observing a person’s activities without his/her knowledge In the computer arena, spying is a technique used to continuously monitor the computer or the network • It is used by the crackers to know the work done by the user on a particular computer • Spying does not corrupt or hack the data but uses the data according to the spy’s interest Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security • Such spyware devices can be used for corporate espionage Spying Spying is the method of observing a person’s activities without his/her knowledge. Spying techniques are used to continuously monitor other’s computer or the network and record all the applications on it. Attackers use this technique to know the work done by the user on the particular system. There are many software programs that can assist spying and be installed on the victim’s computer without his/her knowledge. These programs allow an unauthorized person to secretly monitor and record all the information performed on the computer. Spy software can keep track of all the applications viewed by the user, the files and documents opened, the web pages accessed, and also the instant messages sent. The spy software takes the screen shots of all the applications opened by the user and sends these screenshots over the Internet without the knowledge of the user. Attackers can install the spy software’s into the user’s computer if they have physical or Internet access to the computer. The intruders can hack the computer from a different location through the Internet or they can send attachments of the spyware software, which once opened by the user, will install automatically and spies the computer. Spying is not intended to corrupt or damage the system, but keeps the track of the user’s transactions and will use it if the information is useful to them or to ruin the reputation of a person by taking the information present in his computer. Hidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security, which can be used for corporate espionage. The camera can function during the nighttime and at low light conditions. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3521 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Motives of Spying Money • The main intention of spying is the financial gain Individual conflicts • To take revenge due to some personal or organizational conflicts Information • To get the information which will be useful for the outsider in future Motives of Spying Money: The primary motive for any attacker is to for personal financial gain. An attacker spies on the user’s computer for some important information or any passwords given by the user while transacting online. This information helps the attacker to conduct fraud online. Individual conflicts: Spying can also be possible if there is any conflict or hostility with other person, or any religious, and national differences with others. If an attacker intends to damage the individual’s reputation in the organization, then the individual can be spied for important data about the company. Information: Critical information if lost can cause huge losses to the company. Attackers spy on the victim’s computer for information related to the organization, critical projects, organization structure, sensitive documents, etc. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3522 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Spying Devices Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3523 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Spying Using Cams Spy cams are used to spy on the intended individuals visually As these cameras are very tiny in size, they are not detectable through the naked eyes These cams sometimes also record voice with the help of a microphone which allows you to check even from a far distance Spy cams may be kept in different objects such as, pens, goggles, watches etc. Spying Using Cams Spy cams are used for hidden security surveillance. They are used to spy on any individual to get the intended information, or to learn about an individual’s activities. Spy cams are hidden cameras of tiny size and are undetectable. Spy cameras are mainly used by cops for security purpose to spy on the people set to damage the nation. Most of the people also use spy cams for home security, while spies use it to spy on an individual to steal his/her personal and financial information. Spy cams come with both audio and video recording capabilities, enabling the spy to detect the individual’s movements and their voice. Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3524 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Video Spy Video spying is used to spy continuously on any particular person or object Video spy cams come with audio enabled feature Night vision video cams help to take the videos at the time of low light Video Spy Video Spy captures each and every action of the person being spied. Features: Video spying is used to spy continuously on any particular person or object Video spy cams come with audio enabled feature Night vision video cams help to take the videos at the time of low light Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker Spying Technologies Module XLVII Page | 3525 Ethical Hacking and Countermeasures v6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Video Spy Devices Ultra Mini Pencil Eraser Sized Pinhole Video Camera Video spy camera on the remote car Smoke detector concealing a hidden camera Video transmitter and receiver EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Video Spy Devices (cont’d) Car-Video-RecorderLM-CVR2 Digital Video Recorder/Player EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Video Spy Devices (cont’d) Wireless video camera Lighter based Video camera