SlideShare a Scribd company logo
SpyWare! IQxplorer
Agenda Define SpyWare Discuss methods used for spying Focus on passive tracking methods Demonstrate one passive method Discuss prevention Conclusions
SpyWare Definition SpyWare is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. http://www.microsoft.com/athome/security/spyware/spywarewhat.mspx
SpyWare Categories Advertising (Passive) Capture browsing history Capture buying habits Surveillance (Active) Key loggers System Monitors
SpyWare Statistics 90% of all internet connected machines are infected ~28 SpyWare traces on each machine 1/3 infected with surveillance SpyWare 80% of infections were cookies
Passive Tracking Methods Web Beacons Cookies deposits
Web Beacons Also know as  Web Bugs Clear GIFs Allows destination to log page hits Can be used in conjunction with cookies
Cookie Fields Parameter Description Name The name of the cookie.   Value The value of the cookie.   Expire The time the cookie expires. This is a Unix timestamp so is in number of seconds since the epoch. In other words, you'll most likely set this with the  time()  function plus the number of seconds before you want it to expire.  Path The path on the server in which the cookie will be available.  Domain The domain in which the cookie is available   Secure When set to  TRUE , the cookie will only be set if a secure connection exists. The default is  FALSE .   httponly When  TRUE  the cookie will be made accessible only through the HTTP protocol.  Not supported on all browsers
Web Beacon w/Cookie Example:  spywareWebBeaconCookieDeposit.html <html> <head> <title>Web Beacon Cookie Deposit Example</title> </head> <body> <h1><b>Web Beacon Cookie Deposit Example:</b></h1> <hr /> <img src=&quot;http://www.cs.uccs.edu/~cdshort/serverWebBeacon.php&quot; alt=&quot;Picture&quot; width=&quot;0&quot; height =&quot;0&quot; border = &quot;0&quot; /> </body> </html>
Server Code serverWebBeacon.php <?php  if (!(isset($_COOKIE[&quot;SpyCookie&quot;]))){  setcookie(&quot;SpyCookie&quot;, &quot;ISpyOnYou&quot;, time()+3600); } ?> <html> <head> <title>PHP Test</title> </head> <body> <?php  $filename = 'cookieCapture.txt'; $today = date(&quot;D M j G:i:s T Y&quot;); $Content = &quot;SpyCookie&quot; . &quot; : &quot; . &quot;$_COOKIE[SpyCookie]&quot; . &quot; : &quot; . &quot;$today\r\n&quot;;  if($handle = fopen($filename, 'a')){  fwrite($handle, $Content); fclose($handle); } ?> </body> </html>
Cookie Capture File [cdshort@windom public_html]$ cat cookieCapture.txt SpyCookie : ISpyOnYou : Fri Dec 1 18:30:17 MST 2006 SpyCookie : ISpyOnYou : Fri Dec 1 18:30:38 MST 2006 [cdshort@windom public_html]$
 
Packet Capture
Conclusions Browser settings can prevent cookie deposit  Be careful what you download Don’t open the door willingly The use of cookies is fundamental The information provided is minimal
Questions?
References http://www.php.net/manual/en/function.setcookie.php http://cs.uccs.edu/~cs301/php/php.html Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu,Peng-Chu Wang and Wei-Zen Su. A Surveillance Spyware Detection System Based on Data Mining Methods. 2006 IEEE Congress on Evolutionary Computation. http://www.allaboutcookies.org/web-beacons/ Wes Ames, Understanding Spyware: Risk and Response, 2004 IEEE IT Pro http://www.microsoft.com/athome/security/spyware/spywarewhat.mspx http://www.earthlink.net/about/press/pr_spyAudit/

More Related Content

PPTX
How to Hack Snapchat Account
PDF
7 Tips to Get Your WordPress Site In Shape
PPTX
Hack Snapchat Account
PPT
How to Get Rid of Vosteran.com
PDF
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
PDF
How to free your computer from virus-shara aguirre-director of happiness.m4v
PDF
Playin with Password
PDF
Wifi hotspot instructions
How to Hack Snapchat Account
7 Tips to Get Your WordPress Site In Shape
Hack Snapchat Account
How to Get Rid of Vosteran.com
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
How to free your computer from virus-shara aguirre-director of happiness.m4v
Playin with Password
Wifi hotspot instructions

What's hot (18)

ODP
Eliminate Dregol.com
PPTX
How We Hacked LinkedIn and What Happened Next | JFall 2016
PDF
Bug Bounty - Hackers Job
PPTX
Eğitim
PPTX
Sucuri Webinar: Leveraging Sucuri's API
PPT
Communications Technology For Social Spaces Assignment 3 Formative
PDF
LTSTricks.net
PDF
Chromebook instructions
DOCX
Picasso photostory
PDF
PDF
Bug bounty null_owasp_2k17
PDF
Bug Bounty Hunter's Manifesto V1.0
PPT
UCSFB-CHO EVS Cyber Training
ODP
Alfresco Tech Talk - CMIS
PPTX
Bug Bounty - Play For Money
PDF
PPTX
Community Career Center: The Beginner’s Guide to LastPass
DOCX
How to do hydra-Ethical hacking
Eliminate Dregol.com
How We Hacked LinkedIn and What Happened Next | JFall 2016
Bug Bounty - Hackers Job
Eğitim
Sucuri Webinar: Leveraging Sucuri's API
Communications Technology For Social Spaces Assignment 3 Formative
LTSTricks.net
Chromebook instructions
Picasso photostory
Bug bounty null_owasp_2k17
Bug Bounty Hunter's Manifesto V1.0
UCSFB-CHO EVS Cyber Training
Alfresco Tech Talk - CMIS
Bug Bounty - Play For Money
Community Career Center: The Beginner’s Guide to LastPass
How to do hydra-Ethical hacking
Ad

Viewers also liked (7)

DOCX
PPT
Spyware Portales Puig
PDF
[Challenge:Future] Cube: Education System
PPTX
[Challenge:Future] KZteam: My Dream Job
PPTX
[Challenge:Future] Pemuda: RE-Project through RE-Build and RE-Empower the youth
PPTX
[Challenge:Future] French: My Dream Job
Spyware Portales Puig
[Challenge:Future] Cube: Education System
[Challenge:Future] KZteam: My Dream Job
[Challenge:Future] Pemuda: RE-Project through RE-Build and RE-Empower the youth
[Challenge:Future] French: My Dream Job
Ad

Similar to Spyware (20)

PPTX
Django Web Application Security
PPTX
Web Application Penetration Testing Introduction
PPT
Internet Explorer 8 for Developers by Christian Thilmany
ODP
WebTest - Efficient Functional Web Testing with HtmlUnit and Beyond
PPT
PHP Security
PPT
Cross Site Scripting Augusta For Matrix Session
ODP
dJango
PPTX
Internet Explorer 8 Developer Overview
PPT
Rey Bango - HTML5: polyfills and shims
PPT
Ajax to the Moon
PPTX
HTML5
PPT
Developing Gadgets
PPT
Neil Patel - What You Need to be Measuring and How to Do It
PPT
Better watch your apps - MJ Keith
 
PPT
Successful Teams follow Standards
PPT
Teflon - Anti Stick for the browser attack surface
PPT
Developing Applications for WebOS
PPT
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
PPT
SES Toronto 2008; Joe Dolson
PDF
Computer Networks: An Introduction
Django Web Application Security
Web Application Penetration Testing Introduction
Internet Explorer 8 for Developers by Christian Thilmany
WebTest - Efficient Functional Web Testing with HtmlUnit and Beyond
PHP Security
Cross Site Scripting Augusta For Matrix Session
dJango
Internet Explorer 8 Developer Overview
Rey Bango - HTML5: polyfills and shims
Ajax to the Moon
HTML5
Developing Gadgets
Neil Patel - What You Need to be Measuring and How to Do It
Better watch your apps - MJ Keith
 
Successful Teams follow Standards
Teflon - Anti Stick for the browser attack surface
Developing Applications for WebOS
Incorporating Web Services in Mobile Applications - Web 2.0 San Fran 2009
SES Toronto 2008; Joe Dolson
Computer Networks: An Introduction

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Spyware

  • 2. Agenda Define SpyWare Discuss methods used for spying Focus on passive tracking methods Demonstrate one passive method Discuss prevention Conclusions
  • 3. SpyWare Definition SpyWare is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent first. http://www.microsoft.com/athome/security/spyware/spywarewhat.mspx
  • 4. SpyWare Categories Advertising (Passive) Capture browsing history Capture buying habits Surveillance (Active) Key loggers System Monitors
  • 5. SpyWare Statistics 90% of all internet connected machines are infected ~28 SpyWare traces on each machine 1/3 infected with surveillance SpyWare 80% of infections were cookies
  • 6. Passive Tracking Methods Web Beacons Cookies deposits
  • 7. Web Beacons Also know as Web Bugs Clear GIFs Allows destination to log page hits Can be used in conjunction with cookies
  • 8. Cookie Fields Parameter Description Name The name of the cookie. Value The value of the cookie. Expire The time the cookie expires. This is a Unix timestamp so is in number of seconds since the epoch. In other words, you'll most likely set this with the time() function plus the number of seconds before you want it to expire. Path The path on the server in which the cookie will be available. Domain The domain in which the cookie is available Secure When set to TRUE , the cookie will only be set if a secure connection exists. The default is FALSE . httponly When TRUE the cookie will be made accessible only through the HTTP protocol. Not supported on all browsers
  • 9. Web Beacon w/Cookie Example: spywareWebBeaconCookieDeposit.html <html> <head> <title>Web Beacon Cookie Deposit Example</title> </head> <body> <h1><b>Web Beacon Cookie Deposit Example:</b></h1> <hr /> <img src=&quot;http://www.cs.uccs.edu/~cdshort/serverWebBeacon.php&quot; alt=&quot;Picture&quot; width=&quot;0&quot; height =&quot;0&quot; border = &quot;0&quot; /> </body> </html>
  • 10. Server Code serverWebBeacon.php <?php if (!(isset($_COOKIE[&quot;SpyCookie&quot;]))){ setcookie(&quot;SpyCookie&quot;, &quot;ISpyOnYou&quot;, time()+3600); } ?> <html> <head> <title>PHP Test</title> </head> <body> <?php $filename = 'cookieCapture.txt'; $today = date(&quot;D M j G:i:s T Y&quot;); $Content = &quot;SpyCookie&quot; . &quot; : &quot; . &quot;$_COOKIE[SpyCookie]&quot; . &quot; : &quot; . &quot;$today\r\n&quot;; if($handle = fopen($filename, 'a')){ fwrite($handle, $Content); fclose($handle); } ?> </body> </html>
  • 11. Cookie Capture File [cdshort@windom public_html]$ cat cookieCapture.txt SpyCookie : ISpyOnYou : Fri Dec 1 18:30:17 MST 2006 SpyCookie : ISpyOnYou : Fri Dec 1 18:30:38 MST 2006 [cdshort@windom public_html]$
  • 12.  
  • 14. Conclusions Browser settings can prevent cookie deposit Be careful what you download Don’t open the door willingly The use of cookies is fundamental The information provided is minimal
  • 16. References http://www.php.net/manual/en/function.setcookie.php http://cs.uccs.edu/~cs301/php/php.html Tzu-Yen Wang, Shi-Jinn Horng, Ming-Yang Su, Chin-Hsiung Wu,Peng-Chu Wang and Wei-Zen Su. A Surveillance Spyware Detection System Based on Data Mining Methods. 2006 IEEE Congress on Evolutionary Computation. http://www.allaboutcookies.org/web-beacons/ Wes Ames, Understanding Spyware: Risk and Response, 2004 IEEE IT Pro http://www.microsoft.com/athome/security/spyware/spywarewhat.mspx http://www.earthlink.net/about/press/pr_spyAudit/