SlideShare une entreprise Scribd logo
1  sur  84
Télécharger pour lire hors ligne
Ethical Hacking and
Countermeasures
Version 6
Module XLVIIModule XLVII
Spying Technologies
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.chinapost.com.tw/print/144096.htm
Module Objective
This module will familiarize you
with:
• Spying
i f i• Motives of spying
• Spying Devices
• Spying Tools
• Anti-Spying Toolst Spy g oo s
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
SpyingSpying
Motives of spying
Spying Devices
Motives of spying
Spying Devices
S i T lSpying Tools
A i S i T l
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Anti-Spying Tools
Spying
Spying is a method of observing a person’s activities without
his/her knowledge
In the computer arena spying is a technique used to continuouslyIn the computer arena, spying is a technique used to continuously
monitor the computer or the network
• It is used by the crackers to know the work done by the user on a
ti l tparticular computer
• Spying does not corrupt or hack the data but uses the data according
to the spy’s interest
Hidd i d d i d bHidden cameras, voice recorders, and spy cameras carried by
employees can defeat organizational security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Such spyware devices can be used for corporate espionage
Motives of Spying
MoneyMoney
• The main intention of spying is the financial gain
Individual conflicts
• To take revenge due to some personal orTo take revenge due to some personal or
organizational conflicts
Information
• To get the information which will be useful for the
outsider in future
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spying Devices
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://newsinfo.inquirer.net/
Spying Using Cams
Spy cams are used to spy on the intended individualsSpy ca s a e used to spy o t e te ded d dua s
visually
As these cameras are very tiny in size, they are not
detectable through the naked eyes
These cams sometimes also record voice with the help
of a microphone which allows you to check even from
a far distancea a d sta ce
Spy cams may be kept in different objects such as,
l h
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
pens, goggles, watches etc.
Video Spy
Video spying is used to spy continuously on any particular
bj tperson or object
Video spy cams come with audio enabled feature
Night vision video cams help to take the videos at the time of
low lightg
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Video Spy Devices
Ultra Mini Pencil Eraser Sized Video transmitter and receiver
Pinhole Video Camera
Video transmitter and receiver
Video spy camera on
the remote car
Smoke detector concealing
hidda hidden camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Video Spy Devices (cont’d)
Car-Video-Recorder(LM-CVR2)Digital Video Recorder/Player
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Video Spy Devices (cont’d)
Wireless video camera Lighter based Video camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Video Spy Devices (cont’d)
Rocket spy with Digital VideoBelt Buckle Video Spy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tiny Spy Video Cams
Screw Spy Camera with
Sound
Tiny video camera that can slip
into a pack of cigarettes or
bubblegum wrapper
Sou d
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tiny Spy Video Cams (cont’d)
Wireless spy video camPin hole spy camera
Miniature Digital
camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Underwater Video Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Camera Spy
Cameras can be used to spy on any particularpy y p
person or object and take snapshots for it
S h th t t kSome cameras have sensors that take a
snapshot when anything moves in front of it
which is useful to secure a particular area
Snapshots can be taken for a particular instant
of time which can be set
Night vision cams help to take the snapshots at
the night time
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
the night time
Camera Spy Devices (cont’d)
Blow dryer spy camera Hidden Camera Desk Lamp
Micro dot Camera Subminiature Spy Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Camera Spy Devices (cont’d)
Spy Tie With Built In High
Buttonholed Spy Camera
Spy Tie With Built-In High-
Resolution Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Camera Spy Devices (cont’d)
Button Camera KitSecret Smoker Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Camera Spy Devices (cont’d)
Wireless Hidden Spy Cameras Bullet Pinhole Spy Camera
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Goggle Spy
Under water digital camera mask
records under water videos and audio
Spy sunglass video camera records under water videos and audio
py g
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Watch Spy
Watch consists of small
analogue camera
It consists of LCD camera with RUIM
card used in GSM phones
Miniature watch built in
with spy camera
The spy camera is a touch
screen LCD display
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pen Spy
Wireless camera spy pen Spy pen with built in USB interface
and a card reader SD/MMC
Spy pen digital
voice recorder
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Binoculars Spy
Digital binoculars spy camera
that records video clips
Digital Camera Binoculars
Long distance surveillance
digital camera
Spy camera with LCD screen
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Toy Spy
Wireless Mini SpyCamThis spy plane is used to
trace the enemy movement
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Toy Spy (cont’d)
Remote control car with
built in web cameraInfrared video cam spy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Helicopter
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Wireless Spy Camera
Wireless spy camera draws the power from
fluorescent light tubesfluorescent light tubes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Kit
Button Camera / Screw Set -
CMOS C l H d i d
It spies through wall device
CMOS Color Hardwired
p g
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Scope: Spy Telescope and
MicroscopeMicroscope
Spy Scope is a combined telescope and microscope in one pocket
sized packagesized package
Features:
• Spying operations such as people watching
• Suspicious activity at long distances
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Eye Side Telescope
L k t i ht h d dLook straight ahead and you
can view the object at your
side
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Audio Spy
Spying on any individual with the help of audio recorder’sSpying on any individual with the help of audio recorder s
It records the conversation done by some peopleIt records the conversation done by some people
They are of tiny micro phones which is nearly impossible to
detect by the naked eyedetect by the naked eye
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Audio Spy Devices
MicroDot super mini digital
audio recorder
Spy Microphone
Listening Deviceaudio recorder
Matchstick LapelMatchstick Lapel
Microphone
Digital Voice
Watch Recorder Mini Shotgun Spy Microphone
f di illfor Audio Surveillance
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Audio Spy Devices (cont’d)
h i hShotgun Microphone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Eavesdropper Listening Device
This EAR SPY listening device is used for eavesdropping on any distant
conversation
It uses a ear mounted tiny amplifier to increase the level of ambient sound
It allows to eavesdrop on conversations discreetly upto 80 feet away
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GPS Devices
GPS device in Shoes GPS Tracking Device
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GPS Devices (cont’d)
GPS Watch Trackstick GPS data logger
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Detectors
Spy detectors are used to spy detect delete and recoverSpy detectors are used to spy, detect, delete, and recover
spywares
It consists of a database of most commonly found spywaresIt consists of a database of most commonly found spywares
which is used to delete the spywares immediately
It encrypts all confidential files and folders to provideyp p
complete safety
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Detector Devices
Bug DetectorAnti-Spy Camera Detector
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Detector Devices (cont’d)
Smoke Detector CameraPocket Camera Detector
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Detector Devices (cont’d)
Bug Detector Set
Analog and Digital Bug Detector
Anti-wireless Camera Detector
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Vendors Hosting Spy Devices
Spy Gadgets serious surveillance solutions
h // d /• http://www.spygadgets.com/
The Spy Tools Directory
• http://www.spy-tools-directory.com/index.htmlp // py y /
Amazon.com
• http://www.amazon.com/b?ie=UTF8&node=166205011
Spy Associates spy equipments
• http://www.spyassociates.com/
Paramountzone 007 spy gadgetsParamountzone 007 spy gadgets
• http://www.paramountzone.com/globalear-spy-gadget.htm
Hi-tech surveillance Spy gadgets
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• http://www.spygearco.com/spy-gadgets.htm
Spy Gadgets
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Tools Directory
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Amazon.com
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spy Associates
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Paramountzone
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Surveillance Protection
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SpySpy
Tool
Spying Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Net Spy Pro-Computer Network
Monitoring and Protectiong
Net Spy Pro is the combination of network monitoring andpy g
administration software tool suite
N k S S f k d i l l hiddNetwork Spy Software runs on networks and is completely hidden to
others within the network
The user accesses the activity logs via a hidden and password
protected interface
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Net Spy Pro-Computer Network
Monitoring and Protection: Screenshotg
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SpyBoss Pro
SpyBoss Pro is an Internet monitoring and keylogger computer
software toolsoftware tool
It records all the details of what is done on the computer and records
it
It uses advanced surveillance screen snapshot features
It gives step by step order of the computer utility by the user
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SpyBoss Pro: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CyberSpy
CyberSpy is a powerful PC monitoring and surveillance tool
It records all emails typed and viewed, chat conversations, websites,
keystrokes, passwords typed, and even desktop snapshots
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spytech SpyAgent
Spytech SpyAgent is a powerful monitoring solution with tons ofSpytech SpyAgent is a powerful monitoring solution with tons of
features and configuration options
It records keystrokes, windows opened, applications run, passwords
used, Internet connections, websites visited, emails sent and
received, and even captures screenshots
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spytech SpyAgent: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ID Computer Spy
ID Computer Spy is designed for automatic Internet and PC
surveillancesurveillance
It records emails, Instant Message chats, web sites visited, as well as
program's activities
Features:
• Monitors Internet activities and website
viewing
• Registers PC actions and launched• Registers PC actions and launched
applications
• Records Keystrokes
• Offers password protection for log files
id i i i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Provides a warning monitoring screen
ID Computer Spy: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
e-Surveiller
e-Surveiller is a powerful user-activity monitoring, logging, and real-p y g, gg g,
time surveillance software package
Computers can be monitored on a standalone computer, on a local
area network, and on remote computers across the Internet
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
e-Surveiller: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
KGB Spy Software
KGB Spy Software integrates several tools to ensure thorough
monitoring of computer systemsmonitoring of computer systems
It keeps track of every word or keystroke command entered by a user
and the website visitedand the website visited
It monitors the clipboard and records all pasted items
Features:
• Stealth mode and visible mode of work
• Custom list of monitored applications
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Reports over e-mail and FTP connection
KGB Spy Software: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
O&K Work Spy
O&K Work Spy collects the detailed statistics of what the user
d th tdoes on the computer
It i t f th t
• Work Spy Service receives statistics from
It consists of three components:
Work Spy Service receives statistics from
the client module and saves it to the
database
• Work Spy Client is a small client part that
must be installed on each computer of themust be installed on each computer of the
employee whose comparative statistics you
want to collect
• Work Spy Control Program is used to
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
py g
get and analyze the statistics
O&K Work Spy: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
WebCam Spy
WebCam Spy is a useful tool for home security
Features:
• Automatic video recording
• Automatically adjust sound
volume
• Automatic snapshot saving in
BMP d JPEG fBMP and JPEG format
• Runs external application after
motion is detected
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
WebCam Spy: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Golden Eye
Golden Eye tool tells you about the victim’s activities onGolden Eye tool tells you about the victim s activities on
the computer
It spies:
• Keystrokes (username & password)
• Websites Visited
Wi d Titl f P• Window Title of Programs
• File and Folder Operation
• Screenshot
• Exe File Path
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Exe File Path
Golden Eye: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
A ti S i T lAnti-Spying Tools
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Internet Spy Filter
In real time it blocks spyware web bugs worms cookies ads scriptsIn real time, it blocks spyware, web bugs, worms, cookies, ads, scripts
to protect from being profiled and tracked
It acts like a firewall to protect online privacy and security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Internet Spy Filter: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spybot - S&D
Spybot - S&D is an adware and spyware detection and removal tool
It detects various keylogging and other spy utilities
It securely removes PC and Internet usage tracks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spybot - S&D: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
SpyCop
SpyCop finds spy programs such as Spector designed
f ll d l d dspecifically to record your screen, email, passwords, and
much more
Features:
• Stops Password Theft Dead: It detects spy software that is
put on your computer to capture your passwords
• Keeps Your Emails Private: It alerts you if your emails are
being snooped by spy software
• Kills Instant Message & Chat Spy Software: It keeps your
online chats and instant messages safe from prying eyes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
online chats and instant messages safe from prying eyes
SpyCop: Screenshots
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spyware Terminator
Spyware Terminator is a full-featured adware and spyware scanner
with real time protectionwith real-time protection
It offers manual and scheduled scans
The scan behavior can be customized
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Spyware Terminator: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XoftSpySE
XoftSpySE is a spyware detection scanning and removalXoftSpySE is a spyware detection, scanning and removal
tool, protecting you from unwanted Spyware
Features:
• Complete PC scanning
• Removes ALL Spyware Parasites,
unwanted Toolbars, and Browser
HijacksHijacks
• Prevents identity and credit card theft
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
XoftSpySE: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Spying is a technique to continuously monitor the computer or theSpying is a technique to continuously monitor the computer or the
network and record all the web pages that are visited
S i i d h i f i hi h ill b f l f hSpying is used to get the information which will be useful for the
outsider in future
Network spying monitors the web page accessed on the computer and
makes a chronological record of the visited URL’s
SpyCop finds spy programs such as Spector designed specifically to
record your screen, email, passwords, and much more
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Contenu connexe

Tendances

Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
Demo scripts for UniPCC windows for home
Demo scripts for UniPCC windows for homeDemo scripts for UniPCC windows for home
Demo scripts for UniPCC windows for homeHermesDDS
 
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...CODE BLUE
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.pptNithish Balaji P
 
What Happens When You Press that Button?
What Happens When You Press that Button?What Happens When You Press that Button?
What Happens When You Press that Button?Cellebrite
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Cellebrite
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Private residence complex security. Technical solutions
Private residence complex security.  Technical solutionsPrivate residence complex security.  Technical solutions
Private residence complex security. Technical solutionsSIS Group International
 
Zycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security PresoZycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security PresoRobin Evaige
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video SurveillanceMihika Shah
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopMike Saunders
 

Tendances (20)

File000119
File000119File000119
File000119
 
File000120
File000120File000120
File000120
 
File000115
File000115File000115
File000115
 
Application of science & technology in security management
Application of science & technology in security managementApplication of science & technology in security management
Application of science & technology in security management
 
File000114
File000114File000114
File000114
 
File000117
File000117File000117
File000117
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Demo scripts for UniPCC windows for home
Demo scripts for UniPCC windows for homeDemo scripts for UniPCC windows for home
Demo scripts for UniPCC windows for home
 
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
 
Hasco english
Hasco englishHasco english
Hasco english
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Technology for national security.ppt
Technology for national security.pptTechnology for national security.ppt
Technology for national security.ppt
 
What Happens When You Press that Button?
What Happens When You Press that Button?What Happens When You Press that Button?
What Happens When You Press that Button?
 
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
Extracting and Decoding Smartphone and Tablet Evidence with the UFED Series: ...
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
PROFIsafe and Trends - Pete Brown - Siemens
PROFIsafe and Trends - Pete Brown - SiemensPROFIsafe and Trends - Pete Brown - Siemens
PROFIsafe and Trends - Pete Brown - Siemens
 
Private residence complex security. Technical solutions
Private residence complex security.  Technical solutionsPrivate residence complex security.  Technical solutions
Private residence complex security. Technical solutions
 
Zycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security PresoZycom 2010 Safety & Security Preso
Zycom 2010 Safety & Security Preso
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video Surveillance
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshop
 

Similaire à Ce hv6 module 47 spying technologies

Techfinder Electronics Private Limited, Surat, Industrial Security Solutions
Techfinder Electronics Private Limited, Surat, Industrial Security SolutionsTechfinder Electronics Private Limited, Surat, Industrial Security Solutions
Techfinder Electronics Private Limited, Surat, Industrial Security SolutionsIndiaMART InterMESH Limited
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Ultimate PC Spy
Ultimate PC SpyUltimate PC Spy
Ultimate PC Spydplsurve
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Intelligence Equipment.pptx
Intelligence Equipment.pptxIntelligence Equipment.pptx
Intelligence Equipment.pptxsazidhossain11
 
Invisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptx
Invisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptxInvisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptx
Invisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptxBloomlady
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security ProductsGabriel Vasquez
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security ProductsGabriel Vasquez
 
21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf
21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf
21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf21523105
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersVi Tính Hoàng Nam
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJPaheerathan Sabaratnam
 
Mach5 self defense
Mach5 self defenseMach5 self defense
Mach5 self defenseSteve Kelley
 

Similaire à Ce hv6 module 47 spying technologies (20)

Techfinder Electronics Private Limited, Surat, Industrial Security Solutions
Techfinder Electronics Private Limited, Surat, Industrial Security SolutionsTechfinder Electronics Private Limited, Surat, Industrial Security Solutions
Techfinder Electronics Private Limited, Surat, Industrial Security Solutions
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Ultimate PC Spy
Ultimate PC SpyUltimate PC Spy
Ultimate PC Spy
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Intelligence Equipment.pptx
Intelligence Equipment.pptxIntelligence Equipment.pptx
Intelligence Equipment.pptx
 
Invisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptx
Invisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptxInvisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptx
Invisible Eyes_ Unveiling the World of Spy Cameras and How to Detect Them.pptx
 
Advantages of cctv camera
Advantages of cctv cameraAdvantages of cctv camera
Advantages of cctv camera
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
CCTV & Security Products
CCTV & Security ProductsCCTV & Security Products
CCTV & Security Products
 
CCTV and Security Products
CCTV and Security ProductsCCTV and Security Products
CCTV and Security Products
 
Products
ProductsProducts
Products
 
Security Products
Security ProductsSecurity Products
Security Products
 
CCTV 4l new.pptx
CCTV 4l new.pptxCCTV 4l new.pptx
CCTV 4l new.pptx
 
21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf
21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf
21523105_Julike Adelia Ashari_a practical guide to detecting hidden cameras.pdf
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
CCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJCCTV System - Close circuit television System - UCJ
CCTV System - Close circuit television System - UCJ
 
Secure Surveillance, Mumbai, Dome Camera
Secure Surveillance, Mumbai, Dome CameraSecure Surveillance, Mumbai, Dome Camera
Secure Surveillance, Mumbai, Dome Camera
 
Mach5 self defense
Mach5 self defenseMach5 self defense
Mach5 self defense
 

Plus de Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Plus de Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Dernier

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Dernier (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Ce hv6 module 47 spying technologies

  • 1. Ethical Hacking and Countermeasures Version 6 Module XLVIIModule XLVII Spying Technologies
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.chinapost.com.tw/print/144096.htm
  • 3. Module Objective This module will familiarize you with: • Spying i f i• Motives of spying • Spying Devices • Spying Tools • Anti-Spying Toolst Spy g oo s EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow SpyingSpying Motives of spying Spying Devices Motives of spying Spying Devices S i T lSpying Tools A i S i T l EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti-Spying Tools
  • 5. Spying Spying is a method of observing a person’s activities without his/her knowledge In the computer arena spying is a technique used to continuouslyIn the computer arena, spying is a technique used to continuously monitor the computer or the network • It is used by the crackers to know the work done by the user on a ti l tparticular computer • Spying does not corrupt or hack the data but uses the data according to the spy’s interest Hidd i d d i d bHidden cameras, voice recorders, and spy cameras carried by employees can defeat organizational security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Such spyware devices can be used for corporate espionage
  • 6. Motives of Spying MoneyMoney • The main intention of spying is the financial gain Individual conflicts • To take revenge due to some personal orTo take revenge due to some personal or organizational conflicts Information • To get the information which will be useful for the outsider in future EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Spying Devices EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://newsinfo.inquirer.net/
  • 9. Spying Using Cams Spy cams are used to spy on the intended individualsSpy ca s a e used to spy o t e te ded d dua s visually As these cameras are very tiny in size, they are not detectable through the naked eyes These cams sometimes also record voice with the help of a microphone which allows you to check even from a far distancea a d sta ce Spy cams may be kept in different objects such as, l h EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited pens, goggles, watches etc.
  • 10. Video Spy Video spying is used to spy continuously on any particular bj tperson or object Video spy cams come with audio enabled feature Night vision video cams help to take the videos at the time of low lightg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 11. Video Spy Devices Ultra Mini Pencil Eraser Sized Video transmitter and receiver Pinhole Video Camera Video transmitter and receiver Video spy camera on the remote car Smoke detector concealing hidda hidden camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. Video Spy Devices (cont’d) Car-Video-Recorder(LM-CVR2)Digital Video Recorder/Player EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Video Spy Devices (cont’d) Wireless video camera Lighter based Video camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 14. Video Spy Devices (cont’d) Rocket spy with Digital VideoBelt Buckle Video Spy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Tiny Spy Video Cams Screw Spy Camera with Sound Tiny video camera that can slip into a pack of cigarettes or bubblegum wrapper Sou d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Tiny Spy Video Cams (cont’d) Wireless spy video camPin hole spy camera Miniature Digital camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Underwater Video Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Camera Spy Cameras can be used to spy on any particularpy y p person or object and take snapshots for it S h th t t kSome cameras have sensors that take a snapshot when anything moves in front of it which is useful to secure a particular area Snapshots can be taken for a particular instant of time which can be set Night vision cams help to take the snapshots at the night time EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited the night time
  • 19. Camera Spy Devices (cont’d) Blow dryer spy camera Hidden Camera Desk Lamp Micro dot Camera Subminiature Spy Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. Camera Spy Devices (cont’d) Spy Tie With Built In High Buttonholed Spy Camera Spy Tie With Built-In High- Resolution Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Camera Spy Devices (cont’d) Button Camera KitSecret Smoker Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Camera Spy Devices (cont’d) Wireless Hidden Spy Cameras Bullet Pinhole Spy Camera EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Goggle Spy Under water digital camera mask records under water videos and audio Spy sunglass video camera records under water videos and audio py g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Watch Spy Watch consists of small analogue camera It consists of LCD camera with RUIM card used in GSM phones Miniature watch built in with spy camera The spy camera is a touch screen LCD display EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Pen Spy Wireless camera spy pen Spy pen with built in USB interface and a card reader SD/MMC Spy pen digital voice recorder EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Binoculars Spy Digital binoculars spy camera that records video clips Digital Camera Binoculars Long distance surveillance digital camera Spy camera with LCD screen EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Toy Spy Wireless Mini SpyCamThis spy plane is used to trace the enemy movement EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. Toy Spy (cont’d) Remote control car with built in web cameraInfrared video cam spy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Spy Helicopter EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Wireless Spy Camera Wireless spy camera draws the power from fluorescent light tubesfluorescent light tubes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Spy Kit Button Camera / Screw Set - CMOS C l H d i d It spies through wall device CMOS Color Hardwired p g EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. Spy Scope: Spy Telescope and MicroscopeMicroscope Spy Scope is a combined telescope and microscope in one pocket sized packagesized package Features: • Spying operations such as people watching • Suspicious activity at long distances EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Spy Eye Side Telescope L k t i ht h d dLook straight ahead and you can view the object at your side EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Audio Spy Spying on any individual with the help of audio recorder’sSpying on any individual with the help of audio recorder s It records the conversation done by some peopleIt records the conversation done by some people They are of tiny micro phones which is nearly impossible to detect by the naked eyedetect by the naked eye EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Audio Spy Devices MicroDot super mini digital audio recorder Spy Microphone Listening Deviceaudio recorder Matchstick LapelMatchstick Lapel Microphone Digital Voice Watch Recorder Mini Shotgun Spy Microphone f di illfor Audio Surveillance EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Audio Spy Devices (cont’d) h i hShotgun Microphone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. Eavesdropper Listening Device This EAR SPY listening device is used for eavesdropping on any distant conversation It uses a ear mounted tiny amplifier to increase the level of ambient sound It allows to eavesdrop on conversations discreetly upto 80 feet away EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. GPS Devices GPS device in Shoes GPS Tracking Device EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. GPS Devices (cont’d) GPS Watch Trackstick GPS data logger EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. Spy Detectors Spy detectors are used to spy detect delete and recoverSpy detectors are used to spy, detect, delete, and recover spywares It consists of a database of most commonly found spywaresIt consists of a database of most commonly found spywares which is used to delete the spywares immediately It encrypts all confidential files and folders to provideyp p complete safety EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Spy Detector Devices Bug DetectorAnti-Spy Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Spy Detector Devices (cont’d) Smoke Detector CameraPocket Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Spy Detector Devices (cont’d) Bug Detector Set Analog and Digital Bug Detector Anti-wireless Camera Detector EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Vendors Hosting Spy Devices Spy Gadgets serious surveillance solutions h // d /• http://www.spygadgets.com/ The Spy Tools Directory • http://www.spy-tools-directory.com/index.htmlp // py y / Amazon.com • http://www.amazon.com/b?ie=UTF8&node=166205011 Spy Associates spy equipments • http://www.spyassociates.com/ Paramountzone 007 spy gadgetsParamountzone 007 spy gadgets • http://www.paramountzone.com/globalear-spy-gadget.htm Hi-tech surveillance Spy gadgets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • http://www.spygearco.com/spy-gadgets.htm
  • 45. Spy Gadgets EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Spy Tools Directory EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. Amazon.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. Spy Associates EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. Paramountzone EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Surveillance Protection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 51. SpySpy Tool Spying Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. Net Spy Pro-Computer Network Monitoring and Protectiong Net Spy Pro is the combination of network monitoring andpy g administration software tool suite N k S S f k d i l l hiddNetwork Spy Software runs on networks and is completely hidden to others within the network The user accesses the activity logs via a hidden and password protected interface EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Net Spy Pro-Computer Network Monitoring and Protection: Screenshotg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. SpyBoss Pro SpyBoss Pro is an Internet monitoring and keylogger computer software toolsoftware tool It records all the details of what is done on the computer and records it It uses advanced surveillance screen snapshot features It gives step by step order of the computer utility by the user EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. SpyBoss Pro: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. CyberSpy CyberSpy is a powerful PC monitoring and surveillance tool It records all emails typed and viewed, chat conversations, websites, keystrokes, passwords typed, and even desktop snapshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. Spytech SpyAgent Spytech SpyAgent is a powerful monitoring solution with tons ofSpytech SpyAgent is a powerful monitoring solution with tons of features and configuration options It records keystrokes, windows opened, applications run, passwords used, Internet connections, websites visited, emails sent and received, and even captures screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 58. Spytech SpyAgent: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 59. ID Computer Spy ID Computer Spy is designed for automatic Internet and PC surveillancesurveillance It records emails, Instant Message chats, web sites visited, as well as program's activities Features: • Monitors Internet activities and website viewing • Registers PC actions and launched• Registers PC actions and launched applications • Records Keystrokes • Offers password protection for log files id i i i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Provides a warning monitoring screen
  • 60. ID Computer Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 61. e-Surveiller e-Surveiller is a powerful user-activity monitoring, logging, and real-p y g, gg g, time surveillance software package Computers can be monitored on a standalone computer, on a local area network, and on remote computers across the Internet EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 62. e-Surveiller: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 63. KGB Spy Software KGB Spy Software integrates several tools to ensure thorough monitoring of computer systemsmonitoring of computer systems It keeps track of every word or keystroke command entered by a user and the website visitedand the website visited It monitors the clipboard and records all pasted items Features: • Stealth mode and visible mode of work • Custom list of monitored applications EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Reports over e-mail and FTP connection
  • 64. KGB Spy Software: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 65. O&K Work Spy O&K Work Spy collects the detailed statistics of what the user d th tdoes on the computer It i t f th t • Work Spy Service receives statistics from It consists of three components: Work Spy Service receives statistics from the client module and saves it to the database • Work Spy Client is a small client part that must be installed on each computer of themust be installed on each computer of the employee whose comparative statistics you want to collect • Work Spy Control Program is used to EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited py g get and analyze the statistics
  • 66. O&K Work Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 67. WebCam Spy WebCam Spy is a useful tool for home security Features: • Automatic video recording • Automatically adjust sound volume • Automatic snapshot saving in BMP d JPEG fBMP and JPEG format • Runs external application after motion is detected EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 68. WebCam Spy: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 69. Golden Eye Golden Eye tool tells you about the victim’s activities onGolden Eye tool tells you about the victim s activities on the computer It spies: • Keystrokes (username & password) • Websites Visited Wi d Titl f P• Window Title of Programs • File and Folder Operation • Screenshot • Exe File Path EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Exe File Path
  • 70. Golden Eye: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 71. A ti S i T lAnti-Spying Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 72. Internet Spy Filter In real time it blocks spyware web bugs worms cookies ads scriptsIn real time, it blocks spyware, web bugs, worms, cookies, ads, scripts to protect from being profiled and tracked It acts like a firewall to protect online privacy and security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 73. Internet Spy Filter: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 74. Spybot - S&D Spybot - S&D is an adware and spyware detection and removal tool It detects various keylogging and other spy utilities It securely removes PC and Internet usage tracks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 75. Spybot - S&D: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 76. SpyCop SpyCop finds spy programs such as Spector designed f ll d l d dspecifically to record your screen, email, passwords, and much more Features: • Stops Password Theft Dead: It detects spy software that is put on your computer to capture your passwords • Keeps Your Emails Private: It alerts you if your emails are being snooped by spy software • Kills Instant Message & Chat Spy Software: It keeps your online chats and instant messages safe from prying eyes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited online chats and instant messages safe from prying eyes
  • 77. SpyCop: Screenshots EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 78. Spyware Terminator Spyware Terminator is a full-featured adware and spyware scanner with real time protectionwith real-time protection It offers manual and scheduled scans The scan behavior can be customized EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 79. Spyware Terminator: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 80. XoftSpySE XoftSpySE is a spyware detection scanning and removalXoftSpySE is a spyware detection, scanning and removal tool, protecting you from unwanted Spyware Features: • Complete PC scanning • Removes ALL Spyware Parasites, unwanted Toolbars, and Browser HijacksHijacks • Prevents identity and credit card theft EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 81. XoftSpySE: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 82. Summary Spying is a technique to continuously monitor the computer or theSpying is a technique to continuously monitor the computer or the network and record all the web pages that are visited S i i d h i f i hi h ill b f l f hSpying is used to get the information which will be useful for the outsider in future Network spying monitors the web page accessed on the computer and makes a chronological record of the visited URL’s SpyCop finds spy programs such as Spector designed specifically to record your screen, email, passwords, and much more EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 83. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 84. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited