Tải bản đầy đủ
Choose additional options, and select the Display Alert on Startup check box.

Choose additional options, and select the Display Alert on Startup check box.

Tải bản đầy đủ

Module 05 - System Hacking

m

In tern et Traffic
D ata: This log ALL
incoming and outgoing
internet data transmitted
and received by users. All
email passwords, FTP
passwords, website
transmissions, etc. will be
logged by this feature

FIGU RE 14.15: Selecting additional option

23.

The Confirm S ettin g s wizard appears. To continue click Next.
0■

A r e y o u s u re y o u w ant to c o n tin u e y o u r
c o n fig u ra tio n ? If so , c lic k NEXT.

1. C o n fig u ra tio n
2. E x tra s

S e ttings to be applied:

3. C o n firm S e ttin g s

• A ll logging options w ill be preconfigured for
optim al S tealth
•U sers w ill be alerted S p yA gent is running

4. A p p ly
5. Finish

£ Q SpyAgent lias die
unique ability to allow you to
have its activity logs delivered
to your personal e-mail
address or FTP account





FIGU RE 14.16: Confimi setting wizard

24.

C E H L ab M anual Page 400

Tlie Configurations Applied window appears. Click Next.

E tliical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.

Module 05 - System Hacking

f easy conliguralion and setup wizard j
C o n fig u ra tio n s A p p lie d !

1. Configuration
2. Extras

A ll selecte d s e ttin g s have been applied
s u c c e s s fu lly !

3. Confirm Settings
C lic k F IN IS H to finish the easy configuration
wizard!

4. A p p ly

5. Finish

FIGU RE 14.17: Configuration applied window

25.

The Configuration Finished window appears. Click Finish to
successfully set up SpyAgent.

1. Configuration

m

SpyAgent lias a built in
scheduling feature that allows
you to configure SpyAgent to
log user activities during
specific hours of die day, or
to lock down your computer
at certain times

2. Extras
3. Confirm Settings

C o n fig u ra tio n F in is h e d !

You have now s u c c e s s fu lly setup S p yA gent! I f you
wish to change any s e ttin g s further, c lic k on the
buttons on the S p yA gent in terface for more
o p tio n s !

4. Apply
5. F in is h

|—GOiMij--]
FIGU RE 14.18: Configuration finished window

26.

C E H L ab M anual P ag e 401

The main window o f Spytech SpyAgent appears, as show in the
following tigure. Click Click to continue...

E th ica l H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking

T^EST
I C lic k H e re fo r
‫ י‬O rd e r in g I n f o r m a t io n

General User A c tiv itie s

G eneral
Startup Settings and Conftg

Keystrokes Typed

Windows Viewed

0 Keys Last j ‫־־"־'־־‬

nfigure Logging Options

Programs

(

>

0 A p p lic a tio n !

V

Clipboard

W e lc o m e t o S p y A g e n t * ( S t e p 3 )

0 C lip b o a rd s

j | , j s •l% S p y A g e n t 's u s e r in t e r f a c e . T h is is
w h e r e y o u c a n s t a r t a n d s t o p m o n it o r in g ,
v i e w a c t i v i t y lo g s , c h a n g e s e t t in g s , a n d
c o n f ig u r e t h e s o f t w a r e .

^

!■mote L o g D e live ry
nfigure Remote Delivery

Events Tlfl

Ivanced O p tio n s
e r Control on SpyAgent

>ntent F ilte rin g

0 E v e n ts Log

er and Block A ctivity



cord Desktop Activity

reenS py

Internet A ctivities
E-Mails Se I
0 E -M a ils L o g t ^ : ---------

‫ ׳‬/fl►

I

‫־ (יי‬

= ! n a r tL o g g in g

----------------

Websites Visited

Chat Transcripts

0 W ebsites Logged

0 C o n v e rs a tio n s Logged

Activity Triggered Logging

S c h e d u lin g
Schedule Monitoring 1

V iew M o s t P o p u la r A c tiv itie s S u m m a ry
C lic k here fo r Easy C o n fig u ra tio n and S e tu p W izard

H• Program Options

B e h a v io r A le rts

n

Real-time A ctivity A l e r t s

Log Actions

(• Reports

►Help

FIGURE 14.19: Main window o f SpyAgent

27.
G

To check the general user activities, click Start Monitoring.
------------------------------------------------------- 1— L-ri-J

t

Monitoring User
Activities

m
G e n e ra l U s e r A c t iv itie s

C lick H ere fo r
O rd e rin g In fo rm a tio n

General
Startup Settings and Conflg

Keystrokes Typed

Windows Viewed

0 Keys Last Session

4 Windows Logged

m
Programs Usage

1

!figure Logging Options

< ? 3 2 ^ ScreenSpy Screenshots

1

7n Applications
A ‫; ״ ״‬r«h‫ ״‬n e Logged
nnn.iH
70

1

0 Screenshots Logged

Remote Log Delivery
C o n fig u re R e m o te D e liv e ry

Clipboard Logs

File/Documents Usage

0 C lipboards Logged

0 File Events Logged

Advanced O ptions

Events Timeline

Computer Usage

9 1 Events Logged

2 Sessions Logged

C o nte nt F iltering

Finer Control on SpyAgent

Filter and Block Activity

ScreenSpy

In te r n e t A c t iv itie s

Record Deskt<

E-Mails Sent/Received

A

Internet Activities
0 Connections Logged

0 E-M ails Logged

Websites Visited

Chat Transcripts

2 W ebsites Logged

0 Conversations Logged

View M ost Popular A ctivitie s Summ ary
C lick here (or Easy C o n fig u ra tio n and Setup W izard

j

11• Program Options

6■ Log Actions

Sm artLogging

Activity Triggered Logging

Scheduling
Schedule Monitoring Times

B e havior A lerts

n

Real-time Activity A le rtt>

►Reports

I

i!• Help

FIGURE 14.20: Start monitoing

C E H L ab M anual Page 402

E th ica l H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.

Module 05 - System Hacking

28.

W hen the Enter A c c e s s P assw ord window appears, enter the
passw ord.

29.

Click OK.

C lic k H e r e fo r
O r d e r in g In f o r m a t io n

c o m p u te r m o n ico rin g 'n n d surveillan ce so ftw a re

G eneral User A c tiv itie s

General
Startup Settings and Config

SpyAgent lias a feature
called SmartLogging diat lets
you trigger monitoring when
certain events arise, instead of
nuuiing constantly logging
everything that users do.
SmartLogging ties into die
keystrokes, websites visited,
applications ran, and windows
used logging functions

Keystrokes Typed

Windows Viewed

0 Keys Last Session

4 Windows Logged
C o S lg u re Logging Options

Programs Usage

ScrcenSpy Screenshots

> 70 Applications Logged

0 Scree nsh ots Logged

Remote Log Delivery
Configure Remote Delivery

Clipboard Logs
0 C lip bo ards Logge

Advanced Options

Events Timelim

Content Filtering

Finer Control on SpyAgent

91 Events Logged

Filter and Block Activity

ScreenSpy

In te rn e t A c tiv itie s

Record Deskt<

E-Mails Sent/Received
0 E-M ails Logged

2

;
^

Internet Activities
0 C on ne ction s Logged

Websites Visited

Chat Transcripts

‫ ׳‬W ebsites Logged

0 C on ve rsa tio n s Logged

View Most Popular Activities Summary
Click here for Easy Configuration and Setup Wizard
► P ro g ra m O p tio n s

Lo g A c tio n s

SmartLogging
Activity Triggered Logging

Scheduling
Schedule Monitoring Tim es

Behavior Alerts

n

Real-tim e Activity AlertAJ?

I R e p o rts

► H e lp

FIGURE 14.21: Entering the password

30.

Stealth Notice window appears, read the instructions click OK
N O T E : To bring SpyAgent out o f stealth mode, press
CONTROL+SHIFT+ALT+M on your keyboard.

HU SpyAgent allows you
to save all o f SpyAgent's
keystrokes, websites,
windows, applications,
connections, clipboard,
activity, print jobs, file
usage, and documents logs
to a specified directory at
once - for easier viewing
later on - or so you can
clear your logs without
losing data.

FIGURE 14.22: Stealth mode notice

C E H L ab M an u al P ag e 403

E th ica l H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking

31.

It will show the following window, with the options select Do not
sh o w th is Help Tip again and select Do not sh o w Related Help Tips
like this again. Click click to continue...

S p y A g e n t is n o w m o n i t o r in g y o u r c o m p u t e r .
T o s t o p m o n i t o r in g p r e s s S p y A g e n t 's h o t k e y
c o m b in a t io n - b y d e f a u l t it is
C O N T R O L + A L T + S H IF T + M - th e n e n t e r y o u r
S p y A g e n t p a s s w o rd .

m

SpyAgent features a
large set o f r eporting tools
that allow you to save and
prepare log data for later
viewing, documentation, and
printing. All reports are
formatted in HTML fomiat
for viewing with your webbrowser.

d

Do not shoiv this Help Tip agai

7A

Do not show Related Help Tips

! th is again

FIGURE 14.23: Start monitoing

32.

N ow browse the Internet (anything). To bring spyAgent out ot stealth
mode press CONTROL+SHIFT+ALT+M on your keyboard.

33.

It will ask for the Access Password; enter the password and click OK.

FIGU RE 14.24: Entering the password

C E H L ab M anual Page 404

34.

To check user keystrokes from the keyboard, click K eystrokes Typed
Irom General User A ctivities.

35.

It will show all the resulting keystrokes as shown in the following
screenshot.

E th ical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.