Penetration Testing mailing list archives
Re: Covert Microphone Application
From: Shreyas Zare <shreyasonline () yahoo com>
Date: Fri, 28 Jul 2006 05:14:46 -0700 (PDT)
Writting as customised app is needed as any crappy AV on the laptop will detect any popular backdoors/trojans. As you said a simple app in VB will be good, and could be developed fast. I have developed a trojan The_SPY_v2.1 in VB, with all advance I/O facility (any plugin dll can be loaded on the remote machine and used), but its not for public release ;) Shreyas Zare --- "Thor (Hammer of God)" <thor () hammerofgod com> wrote:
Well, the challenge was to get a recording... And it really isn't that elaborate... I can write a VB app that you can telnet to with a media control in it in no time (but I'm not going to unless I get paid ;) What would be even easier would be to load "NetBus" on the thing... Seems like we were doing remote recording and all that good stuff with NetBus about 10 years ago... No hax0r skillz needed. t On 7/27/06 8:58 AM, "Matt Burnett" <marukka () mac com> spoketh to all:Wouldnt it just be a lot easier for you or yourboss to disconnectthe microphone cable than going though someelaborate scheme to proveit could possibly be done? If they can "ruled" anylaptop at willthen couldnt they also get into your mail servers?Wouldnt anythingthat would be discussed in your meeting generatefollowups in a email?On Jul 26, 2006, at 4:55 AM, shiri_yacov () yahoo comwrote:Hi all, I have recently entered with my boss to our corp.conference roomto discover a new (shining) internet laptop on aside desk in theroom. During our chat I mentioned that the laptop has abuiltinmicrophone and therefore enables coverteavsdropping in case thelaptop is "ruled" from remote position, andtherefore, a conferenceroom PC should have no builtin mic. My sceptic boss replied instantly - "I challangeyou, bring me arecording of any meeting - I`ll replace thelaptop, and you`ll receiveit." I therefore need a small covert application (noneed in processhiding), which will record microphone input tofile. command lineapplication is perfect. Do any of you know any ? Guys, I gotta have this laptop... Regards, Shiri
----------------------------------------------------------------------
-------- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, theonly one to win theAnalyst's Choice Award from eWeek. As attacks through webapplicationscontinue to rise, you need to proactively protect your applicationsfrom hackers.Cenzic has the most comprehensive solutions to meet yourapplication securitypenetration testing and vulnerability management needs. Youhave an option togo with a managed service (Cenzic ClickToSecure) or anenterprise software(Cenzic Hailstorm). Download FREE whitepaper onhow a managedservice can help you:http://www.cenzic.com/news_events/wpappsec.phpAnd, now for a limited time we can do a FREEaudit for you toconfirm your results from other product. Contact us atrequest () cenzic com fordetails.
----------------------------------------------------------------------
--------
------------------------------------------------------------------------------
This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the onlyone to win the Analyst'sChoice Award from eWeek. As attacks through webapplications continue to rise,you need to proactively protect your applicationsfrom hackers. Cenzic has themost comprehensive solutions to meet yourapplication security penetrationtesting and vulnerability management needs. Youhave an option to go with amanaged service (Cenzic ClickToSecure) or anenterprise software(Cenzic Hailstorm). Download FREE whitepaper onhow a managed service canhelp you:http://www.cenzic.com/news_events/wpappsec.phpAnd, now for a limited time we can do a FREE auditfor you to confirm yourresults from other product. Contact us atrequest () cenzic com for details.
------------------------------------------------------------------------------
------------------------------------------------------------------------------
This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Shreyas Zare Co-Founder, Technitium eMail: shreyas () technitium com ..::< The Technitium Team >::.. Visit us at www.technitium.com Contact us at theteam () technitium com Technitium Personal Computers We belive in quality. Visit http://pc.technitium.com for details. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Covert Microphone Application shiri_yacov (Jul 27)
- Re: Covert Microphone Application S.A.B.R.O. Net Security (Jul 27)
- Re: Covert Microphone Application reden () sekure ch (Jul 27)
- Re: Covert Microphone Application mikeiscool (Jul 27)
- Re: Covert Microphone Application reden () sekure ch (Jul 27)
- Re: Covert Microphone Application Matt Burnett (Jul 27)
- Re: Covert Microphone Application Thor (Hammer of God) (Jul 27)
- Re: Covert Microphone Application mikeiscool (Jul 27)
- Re: Covert Microphone Application Shreyas Zare (Jul 29)
- Re: Covert Microphone Application Ralph Forsythe (Jul 27)
- Re: Covert Microphone Application Tonnerre Lombard (Jul 29)
- Re: Covert Microphone Application Volker Tanger (Jul 30)
- Re: Covert Microphone Application Matt Burnett (Jul 31)
- Re: Covert Microphone Application Aaron (Jul 31)
- Re: Covert Microphone Application Thor (Hammer of God) (Jul 27)
- Re: Covert Microphone Application Matt Burnett (Jul 29)
- Re: Covert Microphone Application S.A.B.R.O. Net Security (Jul 27)
- <Possible follow-ups>
- RE: Covert Microphone Application Shenk, Jerry A (Jul 27)