How to detect spyware on your computer. Tracking user activity on the computer - the best spyware Spyware for your computer

Even beginners who are just beginning to master the basics of computer literacy are probably familiar with the concept of a computer virus.

Spyware - malicious spyware for your computer - is NOT a common virus, it is a separate type of illegal interference with the user's computer system.

And most antivirus products contain separate software sections for working with Spyware.

What is the difference between spyware Spyware and common computer viruses - for example, from Trojans or network worms?

A computer virus typically damages the operating system, software, and user data. This, by and large, is what makes Spyware different.

Unlike viruses, spyware does not harm your computer - neither the system, nor programs, nor user files. However, a user, if a spyware is installed on his computer, is unlikely to be able to count on the full performance of his machine - Spyware uses a certain amount, and this can often cause the computer to freeze and slow down.

But this is the technical side of Spyware, what is the essence of spyware?

Computer spyware - what is it?

The task of spyware, as you can see from the name itself, is to periodically collect information about users:

  • this and the contents of the hard disk,
  • and a list of visited internet sites,
  • and email contacts,
  • and other personal information that can be used for some kind of mercantile purposes, unfortunately, often to the detriment of the owner of such information.

All information collected by spyware is sent to those who create it - the Spyware developers. This can be their email address, an Internet server, or any other space on the Internet where information collected by spyware will be stored, waiting for its owner.

In most cases, users are unaware that they are being monitored - spyware tends to run unnoticed because its developers have an interest in getting the information they need over time.

The question arises - why do spyware developers need such information? Information is used for various purposes - it can be a harmless collection of information for statistics on website traffic, but it can also be a collection of data for the purpose of stealing money from credit cards and electronic wallets.

How can spyware get into your computer?

Most often this happens during the installation of third-party applications on the system.

For example, you find a free program on the Internet, and it is installed by default only with the built-in spyware. Moreover, if your antivirus module detects and removes the spyware, the main program will not start.

When installing third-party applications, you need maximum attention, often spyware penetrates the computer after clicking "OK" at the request in the window of the installation wizard.

Another way for such programs to enter the system is directly from the Internet.

The operating system is protected from them by a firewall - a buffer in which attempts to infiltrate spyware are blocked. The firewall is built into Windows, it is activated when there is no antivirus on the computer. Antivirus packages, among other utilities, usually have their own firewall.

Let's take a look at the most common types of spyware below.

Types of spyware

1. Key loggers

Key loggers are perhaps the most dangerous spyware programs used by cybercriminals to obtain pin codes, passwords, logins and other confidential data necessary to access credit cards, electronic (including bank) accounts, and other user accounts. Internet accounts.

Key loggers can also target other classified information, user correspondence - everything that fraudsters can use for their own selfish purposes.

Key loggers are so-called keyloggers; they collect and send information to their developer about all keystrokes on a specific computer. Key-loggers are either prescribed by the program (these are software key-loggers), or connected to the computer as an additional hardware device (hardware key-loggers).

Discover hardware key logger, which is usually smaller than a matchbox, is not difficult. This can be done using an external examination of the computer: are there any suspicious devices connected to the various outputs of the system unit?

The presence of a hardware key logger can be seen from the analysis of data from the Windows Device Manager. There are also special programs that diagnose all computer hardware - for example, SiSoftware Sandra or AIDA64.

Detect and neutralize software key logger using the launch of special programs such as Anti-Spyware. Typically, they are included in the antivirus packages as separate utilities. But Anti-Spyware can also be installed and run separately - for example, Anti-keylogger.

100% protection against key loggers hardly exists. Nevertheless, I would still recommend using it as a habit when entering passwords, for example, to access.

2. Hard disk scanners

Hard disk scanners are spy programs designed to examine the contents of hard drives on a user's computer.

What are hard drive scanners interested in? What files are stored in folders, what programs are installed - any user information that might be useful to a spyware developer.

The scanners of the hard disk send the obtained information to their owner, and for sure, he will be delighted if the results of his work are crowned with success - for example, a couple of TXT files with inspiring names like "My passwords".

3. Screen spies

Screen spies are programs that collect information about what a user is doing on a computer. At specified intervals, such screen spies take screenshots, then send them to their destination - either to the developer or directly to the customer.

The development and implementation of screen spies, in most cases, is ordered by corporations - for example, management in this way can exercise control of office employees, periodically reviewing what the staff is doing during working hours.

4. Proxy spyware

"Proxy spyware" - such spyware, penetrating into user computers, turns them into proxy servers. Attackers can hide behind the victim's computer for illegal actions. As a result, the latter will have to bear responsibility for the deed - the owner of the computer on which the spyware is installed.

A typical example of the work of such "proxy spyware" is sending spam from the victim's computer. Of course, no one will bring him to criminal responsibility, but problems with the provider are guaranteed.


5. Mail spies

Mail Spyware - These spy programs collect information about a user's email contacts.

Information is typically collected in address books, email clients, organizers, and similar software environments. Then all this data is sent to the spyware developer, and he uses it all to send spam.

Another function that spyware can provide is to replace the content of emails.

Mail spies insert ad blocks, links and other material intended to achieve the goals of the developer into the letters of victim users.

Can spyware be protected?

As the saying goes, if there is poison, then there is an antidote. As mentioned above, to counter spyware on the software market, special security programs such as Anti-Spyware are provided. Their main task is to recognize spyware and block their work.

.
Already more 3.000 subscribers.

Who among us did not want to feel like a cool hacker at least once and break at least something? :) Even if not, then how great it would be to get a password from mail / social. the network of a friend, wife / husband, roommate thought at least once every one. :) And you have to start somewhere, after all! A significant part of attacks (hacks) involves infecting the victim's computer with so-called keyloggers (spyware).

So, in today's article we'll talk about what are free software for tracking windows based computers, where you can download their full versions, how to infect the victim's computer with them, and what are the features of their use.

But first, a little introduction.

What is and why are keyloggers needed?

What it is, I think you guessed it yourself. As a rule, they are a kind of program that is hidden (although this is not always the case) installed on the victim's computer, after which it records absolutely all keystrokes on the given node. At the same time, in addition to the pressing themselves, it is usually recorded: the date-time of pressing (action) and the program in which these actions were performed (browser, including the site address (hurray, we immediately see what the passwords are from!); Local application; system services (including passwords for logging into windows), etc.).

From here, one of the problems is immediately visible: I get access to my neighbor's computer for a couple of minutes and I want to get her VK password! I installed a miracle program and returned the computer. How can I then look at passwords? Looking for a way to take the computer away from her again? The good news is: usually not. Most keyloggers are able not only to store the entire accumulated base of actions locally, but also to send it remotely. There are a lot of options for sending logs:

  • Fixed e-mail (there may be several) - the most convenient option;
  • FTP server (who has it);
  • SMB server (exotic, and not very convenient).
  • A fixed flash drive (you insert it into the USB port of the victim's computer, and all logs are copied there automatically in an invisible mode!).

Why is all this necessary? I think the answer is obvious. In addition to the banal stealing of passwords, some keyloggers can also do a number of nice things:

  • Logging of correspondence in the specified social. networks or messengers (for example, Skype).
  • Taking screenshots of the screen.
  • Viewing / capturing data from a webcam (which can be very interesting).

How to use keyloggers?

And this is not an easy question. You have to understand that just finding a convenient functional good keylogger is not enough.

So, what is needed for the successful operation of the spyware:

  • Administrator access to a remote computer.
    Moreover, it is not at all necessary just physical access. You can easily access it via RDP (Remote Desktop Service); TeamViewer; AmmyAdmin, etc.
    As a rule, the greatest difficulties are associated with this item. However, I recently wrote an article on how to get administrator rights in Windows.
  • Anonymous e-mail / ftp (by which you will not be identified).
    Of course, if you break your neighbor Aunt Shura, this item can be safely omitted. As in the case if you have the victim's computer always at hand (ala, find out the passwords of the brother / sister).
  • Lack of working antiviruses / internal Windows protection systems.
    Most public keyloggers (which will be discussed below) are known to the overwhelming majority of antivirus software (although there are logging viruses that are embedded in the OS kernel or system driver, and antiviruses can no longer detect or destroy them, even if they are found). In view of the above, antivirus software, if any, will have to be mercilessly destroyed. In addition to antiviruses, systems such as Windows Defender (which first appeared in Windows 7 and beyond) also pose a threat to our spyware. They catch suspicious activity of the software running on the computer. How to get rid of them can be easily found in Google.

Here, perhaps, are all the necessary and sufficient conditions for your success in the field of stealing other people's passwords / correspondence / photos or whatever else you want to encroach on.

What types of spyware are there and where to download them?

So, let's start an overview of the main keyloggers that I happened to use in my daily practice with links to free download of their full versions (i.e. all the latest versions at the moment (for which you can really find a cure) and with already working and tested cracks).

0. The Rat!

Ratings (out of 10):

  • Stealth: 10
  • Convenience / usability: 9
  • Functionality: 8

This is just a bomb, not a keylogger! In working order it takes 15-20 KB. No wonder: it is entirely written in assembly language (veteran programmers shed tears) and was written mostly by enthusiastic hackers, due to which the level of its secrecy is simply amazing: it works at the OS kernel level!

In addition, the package includes FileConnector - a mini-program that allows you to glue this keylogger with absolutely any program. As a result, you get a new exe-file of practically the same size, and when launched, it works exactly the same as the program with which you glued it! But after the first launch, your keylogger will be automatically installed in invisible mode with the parameters of sending logs that you preset. Convenient, isn't it?

A great opportunity for social engineering (bring a game / presentation file to a friend on a flash drive, or you can even just a Word document (I will tell you about how to create an exe-ik that launches a specific word / excel file in one of my next articles), run, everything is fine and fine, but the friend is invisibly already infected!). Or just send this file to a friend by mail (it is better to download a link, since modern mail servers prohibit sending exe-files). Of course, there is still a risk from antiviruses during installation (but it will not be there after installation).

By the way, with the help of some other tricks, you can glue any distribution of hidden installation (those are in The Rat! And Elite keylogger) not only with exe-files (which still arouse suspicions among a little bit advanced users), but also with ordinary word / excel and even pdf files! Nobody would ever think of a simple pdf, but it didn't work! :) How this is done is the topic of a whole separate article. Those who are especially zealous can write me questions via the feedback form. ;)

All in all, The Rat! can be described for a very long time and a lot. Much better than me it is done here. There is also a download link.

1. Elite keylogger

Ratings (out of 10):

  • Stealth: 10
  • Convenience / usability: 9
  • Functionality: 8

Perhaps one of the best keyloggers ever created. Its capabilities, in addition to the standard set (interception of all clicks in the context of applications / windows / sites), include interception of messenger messages, snapshots from a webcam, and also - which is VERY important! - interception of passwords of the WinLogon service. In other words, it intercepts Windows logon passwords (including domain passwords!). This became possible thanks to its work at the level of the system driver and launching it at the stage of OS boot. Due to the same feature, this program remains completely invisible to Kaspersky and all other anti-malware software. Frankly, I have not met a single keylogger capable of this.

However, do not flatter yourself too much. The installer itself is recognized by antiviruses very easily and to install it, you will need administrator rights and disabling all antivirus services and services. Once installed, everything will work perfectly anyway.

In addition, the described feature (work at the OS kernel level) introduces requirements for the OS version on which keyloggers will work. Version 5-5.3 (links to which are given below) supports everything up to Windows 7, inclusive. Win 8/10, as well as windows of the server family (2003/2008/2012) are no longer supported. There is version 6, which functions perfectly, incl. on win 8 and 10, however, it is not possible to find a cracked version at the moment. It will probably appear in the future. In the meantime, you can download Elite keylogger 5.3 from the link above.

There is no network mode, therefore, for use by employers (to monitor the computers of their employees) or a whole group of people is not suitable.

An important point is the ability to create an installation distribution with predefined settings (for example, with a given mail address, where you will need to send logs). At the same time, at the output you get a distribution kit that, when launched, does not display absolutely any warnings or windows, and after installation it can even destroy itself (if you check the corresponding option).

Several screenshots of the 5th version (to show how beautiful and convenient everything is):

2. All-in-one keylogger.

Ratings (out of 10):

  • Stealth: 3
  • Convenience / usability: 9
  • Functionality: 8

Also a very, very handy thing. The functionality is quite at the level of the Elite keylogger. With secrecy, things are worse. Winlogon passwords are no longer intercepted, it is not a driver, it is not built into the kernel. However, it is installed in the system and hidden AppData directories, which are not so easy to reach for unauthorized users (not those on whose behalf it is installed). Nevertheless, antiviruses sooner or later successfully do this, which makes this thing not particularly reliable and safe when used, for example, at your work place to spy on your own bosses. ;) It will not work to glue it to something or to encrypt the code to hide it from antivirus software.

Works on any version of Win OS (which is nice and practical).

As for the rest, everything is fine: it logs everything (except passwords for logging into Windows), sends it anywhere (including e-mail, ftp, a fixed flash drive). Convenience is also great.

3. Spytech SpyAgent.

Ratings (out of 10):

  • Stealth: 4
  • Convenience / usability: 8
  • Functionality: 10

Also a good keylogger, albeit with dubious stealth. Supported OS versions are also all possible. The functionality is similar to the previous options. There is an interesting self-destruct function after a specified period of time (or upon reaching a predetermined date).

In addition, it is possible to record video from a webcam and sound from a microphone, which can also be in great demand and which the previous two representatives do not have.

There is a network mode of operation, which is convenient for monitoring an entire network of computers. By the way, StaffCop also has it (it is not included in the review due to its uselessness for one user - an individual). Perhaps this program is ideal for employers to spy on their employees (although the leader in this field is unconditionally StaffCop and LanAgent - if you are a legal entity, be sure to look in their direction). Or to keep track of your offspring, who love to sit watching "adult sites". Those. where no more secrecy is needed, but convenience (including a bunch of beautiful log reports, etc.) and the functionality of blocking specified sites / programs (it is also available in SpyAgent).

4. Spyrix Personal monitor.

Ratings (out of 10):

  • Stealth: 4
  • Convenience / usability: 6
  • Functionality: 10

The functionality is at the level of the previous candidate, but the same problems with stealth. In addition, the functionality includes an interesting thing: copying files from USB drives inserted into a computer, as well as remote viewing of logs through a web account on the Spyrix website (but we are going to download a cracked version, therefore it will not work for us).

5. Spyrix Personal monitor.

Ratings (out of 10):

  • Stealth: 3
  • Convenience / usability: 6
  • Functionality: 8

I will not describe in detail, tk. this copy does not have anything that one of the previous spies did not have, however, someone may like this keylogger (at least with its interface).

What do we end up with?

The issue of using a keylogger is more ethical than technical, and it strongly depends on your goals.

If you are an employer who wants to control your employees, feel free to put StaffCop, collect written permissions from all employees for such actions (otherwise you may not be weakly attracted for such cases) and the trick is in the bag. Although I personally know more effective ways to improve the efficiency of my employees.

If you are a beginner IT specialist who just wants to test what it is like to break someone and how it works in general, then arm yourself with social engineering methods and test your friends using any of the examples given. Remember, however, that victim exposure is not conducive to friendship and longevity. ;) And you certainly shouldn't check it at your work. Mark my words: I have experience with this. ;)

If your goal is to spy on your friend, husband, neighbor, or maybe even do it regularly and for money, think carefully about whether it is worth it. After all, sooner or later they can attract. And it’s not worth it: "rummaging through someone else's dirty linen is not a pleasant pleasure." If you still need to (or maybe you work in the field of investigating computer crimes and such tasks are included in your professional duties), then there are only two options: The Rat! and Elite Keylogger. In the mode of hidden installation distributions, glued with word / excel / pdf. And it is better, if possible, encrypted with a fresh cryptor. Only in this case, less safe operation and real success can be guaranteed.

But in any case, it is worth remembering that the competent use of keyloggers is only one small link in achieving the goal (including even a simple attack). Administrative rights are not always available, physical access is not always available and not all users will open, read, and even more so download your attachments / links (hello social engineering), the antivirus will not always be disabled / your keylogger / cryptor will not always be unknown to him ... All of these and many of the unsaid problems are solvable, but their solution is the topic of a whole series of separate articles.

In a word, you have just begun to plunge into the complex, dangerous, but insanely interesting world of information security. :)

Sincerely,Lysyak A.S.

Content

Applications and special programs on smartphones are increasingly used by us in our everyday life. We get used to making purchases with their help, conducting financial transactions, communicating with friends around the world. If it becomes necessary to additionally monitor your child's social circle, to listen to the conversations of company employees or family members, you will need a spy program for android or ios, which is easy to download and install on a smartphone. It will be useful for monitoring children, the elderly, domestic staff or employees.

What is spyware

To use the phone control service, personal registration is required on the program developer's website. When registering, you must remember your login, password to enter the service, confirm your phone number or email address. Spy programs differ from each other in their control functions, in the types of presentation of information "taken" from the controlled apparatus to you. It can be a screen screen, a table of calls, SMS, call records. The program for spying on the Android phone must be downloaded, installed, activated on the smartphone secretly from the user.

Types of spyware

Remote control programs for smartphones are divided into the following types:

Spy functions

By exercising control over the smartphone, the spy program for Android implements the functions of tracking and logging all the actions of the object. After collecting information, depending on the type of functions you have selected, the utility will provide an opportunity to receive data on your smartphone or computer via the Internet:

  • log of incoming, missed, outgoing calls of subscribers with their names, the duration of the conversation;
  • audio recordings of telephone conversations;
  • list and texts of all sms, mms messages with the time they were received or sent;
  • photo and video information taken by the spy camera of the controlled apparatus;
  • the current location of the subscriber with online tracking of movements using geolocation at the base stations of the GSM operator or GPS navigation;
  • the history of visits to the pages of the smartphone browser;
  • accounting of downloaded, installed, used applications;
  • surround sound control with remote microphone control.

Spyware for Android

Among the assortment of spyware on offer, there are free utilities that are ineffective when analyzed and tested. To obtain high-quality information, it is necessary to spend funds for collecting and storing photo, video, audio information. After registering on the developer's website, the client receives a personal account indicating the connected control functions, collected information.

A paid program for wiretapping a mobile phone for Android is developed taking into account the need to satisfy the most fastidious customers in several ways:

  • ease of installation;
  • invisibility of being on a controlled smartphone;
  • convenience for the customer to receive and store the collected information.

Neospy

One of the simplest spyware programs for your computer or smartphone is Neospy. NeoSpy Mobile for Android platform is a legal application that can be downloaded from Google Play. When downloading a new version of NeoSpy Mobile v1.9 PRO with installation, downloading the apk archive, settings are possible, when the program will not be displayed in the list of Google Play applications, it will be able to monitor the smartphone's keyboard, and intercept photos from the camera. The cost of using the program depends on the selected functions and ranges from 20 to 50 rubles per day.

Talklog

More serious is the spy on Android phone Talklog. Before installing it on your smartphone, you will need to disable the anti-virus software. You will need to allow the installation of applications from other sources in your phone's security settings. The Talklog service is a full-fledged spy capable of obtaining almost all information about the activity of a monitored object. The utility has a free trial mode with its capabilities and several basic free functions. The cost will be from 10 to 50 rubles per day, depending on the functionality you need.

Flexispy

The Flexispy spy program for Android includes a huge number of ways to access your smartphone - intercepting SMS, MMS messages, wiretapping your phone, recording phone conversations, reading dialogs from 14 internal chats (Facebook, WhatsApp, Viber, Skype, WeChat, Telegram, etc.) , call interception in real time, listening to the environment of the phone through the microphone, more than 140 functions. The cost of using the utility is appropriate - the minimum Premium package will cost you 6,000 rubles for 3 months, the maximum Extreme - up to 12,000 rubles for 3 months of use.

Mobile Tool

The MobileTool spy application for the Android operating system will provide you with information about calls, SMS, MMS, phone location, phone book. It is able to remove its shortcut from the list of applications. You will have access to functions - viewing photos, protecting against theft by blocking the device, turning on the siren. All information will be available in your account on the application website. There is a two-day trial mode for checking the functionality, discounts depend on the period of use. The average payment for using the utility will be about 30 rubles per day.

Mobile Monitoring

Mobile spy for Android Mobile Monitoring (mobile monitoring) after registering on the site, choosing a tariff plan and payment will make available the saving of telephone conversations, the function of a voice recorder, saving all SMS messages, geolocation of the location of the phone, building routes of movement. The program works on smartphones of any mobile operators in Russia. The cost when choosing only geolocation will be 800 rubles for 3 months, full functionality - 1550 rubles for 3 months, with a 40% discount when paying for a year.

How to install spyware on your phone

The installation of a mobile spy begins with registration via the Internet on the manufacturer's website, choosing a tariff plan, and paying for services. Then a link is provided, which must be entered in the browser of the smartphone to download the program. Some spy programs for Android are available through Google Play and are downloaded like regular applications. When installing and activating the program, you will need permission to access all the smartphone functions necessary for its operation. Permission to use programs that are obtained from unknown sources may be required.

The software for tracking a computer, which I will talk about in this article, is unique in its kind, as it has many advantages that competitors do not have. It is called Expert Home 4. This is what this tool is notable for:

  • The program is completely free and works without any restrictions.
  • Interface, help and support in Russian.
  • Combines many tracking functions.
  • Works in invisible mode, starts with a password and a secret key combination.
  • Allows you to encrypt received reports and send them over the Internet.
  • The antivirus will not swear.

This computer tracking program is really very interesting and worthy of attention. Therefore, fewer words, let's get down to business!

Expert Home 4 - computer tracking software

After downloading the installation file, run it. In the first window, you need to select a language and click "Next".

Then agree to the license and click Next.

Now comes the fun part. The program for monitoring the computer will be opened by a secret key combination consisting of four keys. The first three are Ctrl + Shift + Alt, and the fourth is set by you yourself. It can be any letter that you can select from the list.

In the same window there is a field in which you need to enter a password, which will be requested after entering the secret key combination.

After choosing a letter and entering a password, click Next.

Check all data is correct and click "Install".

Wait until the installation of the Expert Home 4 program is completed, and in the last window, click the "Close" button. Everything! The program has already started its work and monitors all user actions. As you will notice, no trace of the program is visible.

To start the program for tracking the computer and view its report, you need to enter a secret key combination. After that, a window will appear in which you should write down the password you thought up during installation. And then you will see the program interface - Expert Home 4 control center. It consists of two sections - "Reports" and "Additional".

Let me first consider the "Reports" section:

Keyboard. This is a keylogger, that is, there is a report on the pressing of each key on the keyboard. You can see what and in which program was written by the user. It is possible to choose the date of the report.

Screenshots. The program for tracking the computer periodically makes hidden screenshots of the screen and here they can be viewed. It is also possible to select the date of the archive. In addition, you can manage screenshots using the buttons below.

Programs. Displays which programs were launched and when. You can see the title of the programs, the name of the executable file and other data useful for analysis.

Nutrition. Here you can analyze when the computer was turned on and off.

Activity. The activity of computer users is displayed.

Now I will consider the "Advanced" block, which also consists of several important sections.

Internet monitoring. Computer tracking software allows you to transfer report files over the Internet in encrypted form. They can be viewed in the Softex (program developer) file storage. That is, reports can be viewed remotely. First, click the "Allow Remote Tracking" button.


Did you like the article? To share with friends: