Home page logo
/

pen-test logo Penetration Testing mailing list archives

RE: Covert Microphone Application
From: "Mermod, Denis" <Denis.Mermod () EssexCorp com>
Date: Thu, 27 Jul 2006 07:37:35 -0400

Remote into the laptop (use the standard remote software built in) and
activate the mic program.  No fancy schmancy needed - I believe you can
remote in via RDC or via registry (find mic hive(s)) and turn them on.

Can you get two laptops?

Denis Mermod, MCP, NSA IAM
Information System Security Officer
Essex Corporation
9020 Junction Dr.
Annapolis Junction, MD 20701
dmermod () essexcorp com
301-617-8916 (Office)
410-370-0227 (Cell)
301-688-2200 Pin 5441 (Pager)
-----Original Message-----
From: shiri_yacov () yahoo com [mailto:shiri_yacov () yahoo com] 
Sent: Wednesday, July 26, 2006 5:55 AM
To: pen-test () securityfocus com
Subject: Covert Microphone Application

Hi all, 
I have recently entered with my boss to our corp. conference room to
discover a new (shining) internet laptop on a side desk in the room.
During our chat I mentioned that the laptop has a builtin microphone and
therefore enables covert eavsdropping in case the laptop is "ruled" from
remote position, and therefore, a conference room PC should have no
builtin mic.
My sceptic boss replied instantly - "I challange you, bring me a
recording of any meeting - I`ll replace the laptop, and you`ll receive 
it."

I therefore need a small covert application (no need in process hiding),
which will record microphone input to file. command line application is
perfect.

Do any of you know any ?

Guys, I gotta have this laptop...

Regards, 
Shiri

------------------------------------------------------------------------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's 
Choice Award from eWeek. As attacks through web applications continue to
rise, 
you need to proactively protect your applications from hackers. Cenzic
has the 
most comprehensive solutions to meet your application security
penetration 
testing and vulnerability management needs. You have an option to go
with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service
can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm
your 
results from other product. Contact us at request () cenzic com for
details.
------------------------------------------------------------------------
------


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault