Penetration Testing mailing list archives

Re: Covert Microphone Application


From: Matt Burnett <marukka () mac com>
Date: Thu, 27 Jul 2006 10:58:25 -0500

Wouldnt it just be a lot easier for you or your boss to disconnect the microphone cable than going though some elaborate scheme to prove it could possibly be done? If they can "ruled" any laptop at will then couldnt they also get into your mail servers? Wouldnt anything that would be discussed in your meeting generate followups in a email?

On Jul 26, 2006, at 4:55 AM, shiri_yacov () yahoo com wrote:

Hi all,

I have recently entered with my boss to our corp. conference room to discover a new (shining) internet laptop on a side desk in the room.

During our chat I mentioned that the laptop has a builtin microphone and therefore enables covert eavsdropping in case the laptop is "ruled" from remote position, and therefore, a conference room PC should have no builtin mic.

My sceptic boss replied instantly - "I challange you, bring me a recording of any meeting - I`ll replace the laptop, and you`ll receive

it."


I therefore need a small covert application (no need in process hiding), which will record microphone input to file. command line application is perfect.


Do any of you know any ?


Guys, I gotta have this laptop...


Regards,

Shiri

---------------------------------------------------------------------- --------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------- --------



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: