lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <00d301c7441f$894d2dc0$c1b211ac@papslaptop>
Date: Mon, 29 Jan 2007 22:34:18 -0500
From: "Clement Dupuis" <cdupuis@...ure.org>
To: "'Simon Smith'" <simon@...soft.com>, "'Jim Popovitch'" <jimpop@...oo.com>,
	"'Untitled'" <full-disclosure@...ts.grok.org.uk>
Subject: Re: PC/Laptop microphones

This was discussed in the past.  It is one of the features within Core
Impact from Core Security.  Here is an old post on the subject:

> CORE IMPACT has a Python module (uses win32api)to do just that, it is
called
> "Record audio file" (there is also a "play audio file" and a "grab 1 frame
> from Webcam")
>
> Basically, it uses the Windows MCI interface:
>
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/multimed/ht
m/_win32_about_mci.asp
>
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/multimed/ht
m/_win32_mci_reference.asp
>
> There is also a generic "Execute MCI string" that we commonly use to amuse
> ourselves by opening/closing the CD door remotely once we've gain access
to
> a target system running windows.
>
> It should not be difficult to write your own quickly with Python and the
> above reference from the MSDN
>

-----Original Message-----
From: Simon Smith [mailto:simon@...soft.com] 
Sent: Monday, January 29, 2007 10:02 PM
To: Jim Popovitch; Untitled
Subject: Re: [Full-disclosure] PC/Laptop microphones

Jim, 
    In all reality you don't have to be an agent  to do this. You could just
write an exploit that when successfully executed would compromise the target
and then fetch an application from a remote site. I'm sure that things like
this have been done in the past. Hell imagine what you could do with a web
cam! ;]

    New telephones are no different I'm sure.

On 1/29/07 9:26 PM, "Jim Popovitch" <jimpop@...oo.com> wrote:

> I started this discussion elsewhere, but I feel that there is more
> experience and concern here.   When I look at BIOS settings I see config
> options to disable sound cards, USB, CDROM, INTs, etc., but what about
> the PC or laptop microphone?  Does disabling the sound card remove the
> availability of a built-in microphone? What if I want to play mp3s but
> never have the need to use a microphone? Given recent info about the US
> FBIs capabilities to remotely enable mobile phone microphones
> (presumably via corporate cellular service providers), what prevents my
> OS provider (or distribution) and ISP from working on a way to listen in
> on my office or home conversations via the microphone or the built-in
> speakers?  Thoughts?
> 
> -Jim P.
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ