🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 1 - 03 - Define Malware and its Types - 19_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Exam 212-82 Spyware Tools: Spytech SpyAgent and Power Spy Spytech SpyAgent Spytech SpyAgent allows you to monitor everything users do on your computer Chak hewve for = Graering Infoemation ~ L & m 24 Screenshots Sove...

Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Exam 212-82 Spyware Tools: Spytech SpyAgent and Power Spy Spytech SpyAgent Spytech SpyAgent allows you to monitor everything users do on your computer Chak hewve for = Graering Infoemation ~ L & m 24 Screenshots Sovenhets Cverns Logged L L e Logaed Computer Usage g Ogtums - v ) Mo O o [ Tovasans | Lwer NI G Al Atra IR D028 AM Atens 1T AN nva e M e 0 Sehoct Lo Pypuac Captates v e Adwen Adeen g NN 9 M A2AM Adens a wONUONE Logoe: X - ¥R ) Gonge Searcy - MR fg. ) - Gange Tearcy - Maa e an sy Adens v o - Mcrone® foge ‘ metates vired [rvcions Openar e St D) Poweer Sy SoMaire - Mo e Coxamares | Qasswre Y Eort Vebary Wrcpters v a Vimestampe Uty Mame: /102009 9 30 45 A Ad o Conteat: Ntermet Barking |Wet Barkng | Cone Backing | Perscod Bankrg Senvices - 107 Activity Webaite x Cavsert Adese NN MM AM WARDIN G AN | VIR0 0L AN NINIIS M AM toresranaa apigent F £-Mail re on your computer Avhidrrn i Mic & Webcam sohures 3 Yl T Loy Voew - Wendown Opered 11 ecevetsl ) Logging Carfyy ‘))Q 40 Powe tivities VINNA S 0 Lty Events Timeline m Spy 2 st Geneonl Logoal - et Moosch Eage Usage View Most Popular Activ Start Monitoring. K MG, B VIO ents 'S Ramme. R https:/fwww.spytech-web.com = S ) Dulete OubteAl Lapert hetps://ematrixsoft. com Spyware Tools = Spytech SpyAgent Source: https://www.spytech-web.com Spytech SpyAgent is computer spy software that allows you to monitor everything users do on your computer—in total secrecy. SpyAgent provides a large array of essential computer monitoring features, as well as website, application, and chat client blocking, logging scheduling, and remote delivery of logs via email or FTP. As shown in the screenshot, attackers use Spytech SpyAgent to track the websites visited, online searches performed, programs and apps in use, file and printing information, email communication, user login credentials, etc. of the target system. Module 01 Page 86 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Exam 212-82 Click Here for J SpyAgent & Program Options [E] Log Actions th. Reports I Select an Activity Log Startup View Keystrokes Log Loggmg Confi View Mouse Clicks Log 14 Windows Logged & Events Timeline Files & Documents 348 Events 1158 File Events Logged Logged = E-Mail Activity 0 E-Mails Logged Monitoring Settings and Conlflig * Logging Opt Usage 90 Application © Advanced Finer Control Computer Usage 2 Sessions Logged Mic & Webcam 0 Captures Logged Options on SpyAgent Content Filtering Filter and Block Activily ScreenSpy [ Website Usage 10 Websites Logged View Most Popular Activities Summary Start ogram 23 © Help (=) Setup Wizard General ivi = Ordering Information [©) Internet Activities 326 Connections Logged - ord Desklop Activily SmartLogging Chat & Social 0 Activities Logged View Day & Hour Activity Graphs Monitoring Stopped. Click "Start Monitoring® to Resume. Scheduling Behavior Alerts Real-time Activily Alerts Figure 1.18: Screenshot of Spytech SpyAgent = Power Spy Source: https://ematrixsoft.com Power Spy is PC-user activity-monitoring software. It runs and performs monitoring secretly in the background of a computer system. It logs all users on the system and users will not be aware of its existence. As shown in the screenshots, attackers use this tool to monitor the target system and record all user activities, such as screenshots, keystrokes, applications executed, windows opened, websites visited, chat conversations, documents opened, etc. Module 01 Page 87 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Information Security Threats and Vulnerabilities Power Exam 212-82 Spy Control Panel ©) Buy now i] ® Sta monitoring ©, Stealth Mode Clipboard 0 \.LJ ' Configuration @® o Help & About Microphone Uninstall Figure 1.19: Screenshot of Power Spy [W] Log View - Windows Opened 11 record(s) & SelectUser: T @ |W [m] [Timestamp 7/19/2019 9:30:45 AM 7/19/2019 9:30:42 AM 7/19/2019 9:30:35 AM [i1) Select Log Type: Screenshots Keystrokes Applications Websites Visited \Windows Skype 7/19/2019 7/19/2019 7/19/2019 7/19/2019 7/19/2019 7/19/2019 7/19/2019 9:30:26 9:26:33 9:26:31 9:26:26 9:26:24 9:26:11 9:26:04 AM AM AM AM AM AM AM User Name Admin Content | Admin dng Banking | X | | | 22222 netbanking - Google Search - Microsoft Edge | Admin |Google - Microsoft Edge 'Admln | Admin | Admin | Admin | Admin | Admin | Admin | Start Using Powser Spy Software - Microsoft Edge | Internet Banking |Net Banking | Online Banking | Personal Banking Services |Internet Banking |Net Banking | Online Banking | Personal Banking Services |Internet Banking |Net Banking | Online Banking | Personal Banking Services - 1 | 22222 netbanking - Google Search - Microsoft Edge |Google - Microsoft Edge | New tab - Microsoft Edge 7/19/2019 9:26:02 AM | Admin el - Microsoft | Dol (Not responl

Use Quizgecko on...
Browser
Browser