Illustration of "Spyware"

Software to capture and ex-filtrate data from a device.

Software to capture and ex-filtrate data from a device.

Infect the computer

use flaws (copy, bufer overflow, ...) for privilege escalation, write in windows registry, start up, file associations, ...

Retrieve informations

Pull (listen for incoming connections) and Push (email, web, ...).

Self-Protection

Rookit (infect the OS itself) to avoid detection

Anti-spyware

Detect hooks, registry modification, syscall graph, ...