Showing posts with label keylogger. Show all posts
Showing posts with label keylogger. Show all posts

Thursday, June 12, 2014

Target Eye articles and source code

This new article contains another portion of the Target Eye Monitoring System's source code along with the secret behind the method used by Target Eye to hide its files. Target Eye was able to hide its own files along with all files collected from the target machine, prior to sending it to its operator. The article explains how these files are hidden, along with exposes how to reveal these hidden files.

The default UI

Target Eye uses a simple (and yet unique) mechanism  to hide files but the trick will work on most new Windows systems (including Windows 8) that because the only option to reveal these hidden files is not part of the default user interface of the Windows Files Explorer, so even if the "Show Hidden Items" is checked, the Target Eye hidden files will not be revealed.
You can read more and browse further parts of the Target Eye source code in the following articles:

1.  The first article is about Target Eye's Auto Update mechanism, and how it is capable of checking for updates, downloading them when there are, installing them and running them instead of the old version currently running, all of the above, with no end-user intervention.

2. The second article was about the Target Eye's screen capturing mechanism, and how compact JPG files are created combining a reasonable image quality and a small footprint.

3. The third article was about the Shopping List mechanism.

4. The forth article is about Keyboard capturing.

5.The fifth article deals with the packaging used to let our Secret Agent in. In other words, how Target Eye can be used to wrap it with what we refer to as "cover story"

6. the sixth article deals with the packaging used to let our Secret Agent in. In other words, how Target Eye can be used to wrap it with what we refer to as "cover story".

Saturday, September 21, 2013

An article about Target Eye won the first prize

An article about Target Eye keyboard capturing mechanism has won the 1st prize! 

This article explains how keystrokes were logged and which possible techniques can be used for effective keyboard capturing.

The article is the fourth in a series about the Target Eye Monitoring System , developed in 2000, and since. The first article was about Target Eye's Auto Update mechanism, and how it is capable of checking for updates, downloading them when there are, installing them and running them instead of the old version currently running, all of the above, with no end-user intervention. The second article was about the Target Eye's screen capturing mechanism, and how compact JPG files are created combining a reasonable image quality and a small footprint. The third article was about the Shopping List mechanism. Well, the next significant component of the Target Eye system is Keyboard Capturing. There are several methods to implement it and many issues to be aware of, so besides the historical value that some people may find in this product, I hope to bring some technical value as well... Smile | <img src=

Articles and source code of previous versions
1. http://www.codeproject.com/Articles/310530/Target-Eye-Revealed-part-1-Target-Eyes-Unique-Auto
2. http://www.codeproject.com/Articles/460498/Target-Eye-Revealed-sharp2-Target-Eyes-Screen-Capt
3. http://www.codeproject.com/Articles/461344/Target-Eye-Revealed-part-3-The-Shopping-List-Mecha
4. http://www.codeproject.com/Articles/635134/Target-Eye-Revealed-part-4-Keyboard-Capturing
5. http://www.codeproject.com/Articles/635384/Target-Eye-Revealed-The-Cover-Story

Sunday, December 5, 2010

Target Eye Monitoring System 2011

Target Eye Monitoring System - Since 2000

במהלך השנים 2006 ועד היום, נמשך פיתוח תוכנת Target Eye Monitoring System וגירסת 2013 (הגירסה הנוכחית) כוללת שכלולים רבים, תיקון באגים מהגירסה הקודמת (גירסת 2007), ופיצ'רים חדשים את רובם לא ניתן לפרט כאן.


  • ניתן לנטר את המחשב מרגע הפעלתו (גם לפני ביצוע Log In של משתמשים).
  • תצלומי המסך כוללים לכידת תצלומים (סטילס ווידאו) ממצלמת האינטרנט המובנית, במידה וקיימת (או מחוברת חיצונית), מופעל על ידי Motion Detection.
  • ניטור מלא של צ'אטים, שיחות קוליות ושיחות וידאו.
  • פעולה נסתרת לחלוטין של התוכנה על כל קבצי המידע שהיא אוספת.
  • יכולת להפעלה מדיסק און קי, ללא הרשאת Admin, ובאופן חלק (ללא צורך להפעיל תוכנה כלשהי).
  • גירסה חדשה לקומפיילר, הכוללת אפשרות לתזמן כל פעולה ופעולה ברמת פירוט מקסימלית.
כל אלה מצטרפים לבסיס המוצק של התוכנה, קוד המקור המקורי שהנו פרי פיתוח שנמשך מאז שנת 2000, ומהווה השלד של המוצר, מה שהופך אותו ליציב ומתאים לעבודה רציפה של שבועות, חודשים ואף שנים. בסיס זה כולל את מנגנון לכידת המסכים הייחודי מנגנון לכידת המקלדת, מנגנון ה-Shopping List, ושלד הליבה של המוצר. כמו כן מאמר על שיטת סיפור הכיסוי
The Target Eye Shopping List™ mechanism (Taken from the 2005 version)
תוכנת Target Eye Monitoring System מוצעת כיום למכירה לגופים ממלכתיים ולרשויות אכיפת חוק בלבד. התוכנה מוצעת גם לגופים ממלכתיים בחו"ל באישור אפ"י.(לתוכנה הוענק בשנת 2007 סיווג "סודי ביותר"). 

לפרטים: info@targeteye.biz
 ©2000-2011  Target Eye LTD (UK)
All materials contained on this article are protected by International copyright law and may not be used, reproduced, distributed, transmitted, displayed, published or broadcast without the prior written permission given by Target Eye LTD (UK). You may not alter or remove any trademark, copyright or other notice from copies of the content

Sunday, November 7, 2010

Target Eye Monitoring System 2011



Target Eye Monitoring System - Since 2000

Since 2006 and today, we have continued developing Target Eye Monitoring System, and version 2011 (current version) includes many enhancements, bug fixed from last version (version 2007), along with new features, most of which can't be listed here:

  • A computer can be monitored from the moment it is turned on (even before users log in)
  • Screenshots contains embedded webcam shots (still image and video) taken from any webcam attached, if any, including external webcams. Operaiton is triggered by a Motion Detection mechanism.
  • Chats, video chats and voice conversations are fuly monitored.
  • Covert and hidden operation, including the software and all collected data.
  • Can be initiated by insertion of a Thumb Drive, with no need for elevation to Admin privileges, and with no need to start any software.
  • A new version for the Target Eye Compiler, which includes enhanced timing options, which makes it possible to schedule any type of informaiton monitored.
All of the above are added to the solid base of core elements, based on 11 years of research and development (since 2000). The core of the product makes it stable and suitable for weeks, months and even years of constant operation, and includes elements such as the Screen Capturing engine, the Shopping List Mechanism, Keyboard Capturing, the Cover Story mechanism, and other parts and components.




The Target Eye Shopping List™ mechanism (Taken from the 2005 version)
Target Eye Monitoring System is available only to Goverment Agency and Law Enforcement Agencies, and is subject to Expeort Control restrictions.

For further details: info@targeteye.biz

 ©2000-2011 Target Eye LTD (UK)
All materials contained on this article are protected by International copyright law and may not be used, reproduced, distributed, transmitted, displayed, published or broadcast without the prior written permission given by Target Eye LTD (UK). You may not alter or remove any trademark, copyright or other notice from copies of the content