Tải bản đầy đủ
Click Stealth Mode (stealth mode runs the Power Spy completely invisibly on the computer) .

Click Stealth Mode (stealth mode runs the Power Spy completely invisibly on the computer) .

Tải bản đầy đủ

Module 05 - System Hacking

Power Spy

Control Panel

‫ם‬

Buy now | g

®

f

Stop
monitoring

Keystrokes

H otkey rem inder
The Stealth Mode is started and the software will run completely invisibly.
To unhide it, use your hotkey: Ctrl + Al + X. (Press the 3 keys together on
your keyboard). Hotkey only works in current Windows user account. It is
disabled in other user accounts for security.

I °K 1
■■ ■■ ■
Applications
executed

cnpDoara

w m

About

Y
microphone

(£>
Uninstall

Export all logs

m

Easy-to-use Interface:
config Power Spy with
either Wi2ard for common
users or control panel for
advanced users. Userfriendly graphical program
interface makes it easy for
beginngers.

D elete all logs

FIGURE 15.11: Stealth mode window

17.

The Confirm window appears Click Y es.
Comfirm
Are you sure you remember this?

1

ves

|1

No

|

FIGURE 15.12: Stealth mode notice

18.

N ow browse the Internet (anytiling). To bring Power Spy out of
stealth mode, press CONTROL+ALT+X on your keyboard.

19.

The Run a s adm inistrator window appears. Click Run.

Run as administrator

‫י‬

*

With administrative rights, you can check, delete and export logs, change settings, and
have complete access to the software

FIGU RE 15.13: Rim as administrator

C E H L ab M anual Page 413

E th ical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.

Module 05 - System Hacking

20.

The Enter login passw ord window appears. Enter the password
(which is already set) .

21.

Click Submit.

FIGU RE 15.14: E nter the password

22.

Click Later in the R egister product window to continue if it appears.

23.

Click Stop monitoring to stop the monitoring.

Power Spy

a

Control Panel

f

(

®
Stop
m onitoring

Keystrokes
websites visited

®
Stealth Mode

JP

(D *
■ ■■■■
■■■■■
■■■■■
Applications
executed

Buy now

®
Configuration

m

clipboard

1‫׳‬

®
About

microphone

Export all logs

D elete all logs

FIGU RE 15.15: Stop the monitoring

24.

To check user keystrokes from the keyboard, click K eystrokes in
Power Spy Control Panel.

C E H L ab M anual Page 414

E th ical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking

Power

m

Program Executed —
log all programs including
application, executable file,
documents and directories
navigated with time,
Windows username,
application/document/ direct
ory name and file paths..

S p y Control Panel

‫ם‬

f

screenshots

D
■■■■ ■
■■■■ ■
■■■■■
Applications
executed

Start
monitoring

Keystrokes
websites visited

P

*

(O)

Yahoo
messenger

m

clipboard

Configuration

©

1‫׳‬

About

microphone

Export all logs

Delete all logs

FIGU RE 15.16: Selecting keystrokes from Power spy control panel

25.

It will show all the resulted keystrok es as shown
screenshot.

26.

Click the C lose button.

li/JWUJ£«:>/*« MNMMIir
1/3»fX12w.1m
173>OCl3?-.H!t7W«

u n ti*
im tm i
Aor*t,t.tgr
*awiHIr

111

the following

4!Cnto)
fM|(O.0v

!VKf•■ In (•K^rwtwA
» — »H

fjpHV»n.10d<1|m » iPMKtminr jn
{CtrkfCtrfc

.>— >«! wayim •m (attjiwrotor ew wm :
l« w •m
vyajra• •m («H)«two*ofroAct'cAa :
09‫»* יי•׳‬

.

»Vfogr•"«n(xMjamn*•**•(* un5W:

(*(a*

txytm
jhfXP^oCW _____

;W
ear—

oAa'cAa

:;»2SUIO.I2m

<£«*

«Wl(O.I)v

1
(m
•AraVAi
1 ogr«* l« (nK)rweeeF
V•(•/•'• •<1
1A«t*u

lV»aU£4J:}SfM

(4j0*-t VWnjm

:toragranHes(*»Jmco»of ofto'pWct

173*01132=Mt430M

'

5‫ ^׳‬gt E»<‫] • ־‬io* 23.2052 2:M:25 ‫ימ‬1
leabcaton P*h‫׳‬

J
FIGU RE 15.17: Resulted keystrokes
£Q ) Documents Opened log all text contents of
documents opened in MS
Word and NotePad.

27.

Pow er Spy Control Panel.

28.

C E H L ab M anual Page 415

To check the websites visited by the user, click W ebsite visited in the
It will show all the visited w e b site s, as shown
screenshot.

111

the following

E tliical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.

Module 05 - System Hacking

1ya/2Cl22:42:»m
1va/xu 2:42:27
IV2M£ 122:42:23fM
1VJtfX122:42:20fW

btfpjfttnteroaot.ctr\(«‫׳‬toggesr‫׳‬fny1ea-tefrht«py/gnalTnoo>tan\jbu»ras-1>}««
tYto/'Brafrjcsoft camkeooooo»‫ ׳בבי׳פי״■<־‬1e*trtrt .g>c

:7W3C17‫ן י»יג‬j PM
1V21/2C122142110m

hnp/fmM (U^» w,u1u-!b1t-«1].lw~«1tn1>lkM-a‫־‬n>7)UI.«•*•1*^31•UF'bJConalnvc**r
w o *»r
wa
!^/, nUwn.ilIliAU :vHVVM• *pt-ttftoOT-tAp(1

2V9/3C122:!7:40PM

fCpj/rw*.Q>o1)e.x>.rfttarT<11-J0cax>»jnaAsio1-T0>yw»jna •baoaooi ♦0na*sS$1j»r*»*
m

I eM atrixS o ft

Featured Product

‫ ־‬Power Spy »oftn‫־‬ar» offlral t«r. m e* 2004

I

PC Screen Spy Monitor 2013 spy software

Power Spy 201.‫ך‬

>3

Um m caam un«l
.H1i«cjpturot ill

1v g if PC. 10 nmtr ‫יי‬bn w l o r m t i f a ie c t lor c atm in t

FIGU RE 15.18: Result o f visited websites

Lab Analysis
Analyze and document die results related to the lab exercise. Give your opinion on
your target’s security posture and exposure.

P LE AS E TALK TO YOUR I N S T R U C T O R IF YOU HAVE Q U E S T I O N S
R E L A T E D T O T H I S L AB .

T o o l/U tility

Information C ollected /O b jectives Achieved
O u tp u t:

Pow erSpy 2013

‫י‬
‫י‬
‫י‬
‫י‬

M onitoring keystrokes typed
Website log entries
Pages visited for selected website
Internet traffic data

Internet C onnection Required
□ Yes

0 No

P latform S up p o rted
0 C lassroom

C E H L ab M anual P ag e 416

0 !Labs

E th ica l H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

4