Search phone calls for keywords with Metasploit

Powered by SC Magazine
 

Find passwords, company secrets in tapped conversations.

A largely unknown function within the Metasploit framework has been upgraded that allows phone calls to be recorded and then trawled for sensitive information.

The powerful microphone recording function has existed for about two years and is helpful to penetration tests yet is rarely used.

Rapid7 MetaSploit developer Wei Chen, known as Sinn3r, says the feature was upgraded two weeks ago from a basic meterpreter command to a cross-platform post module which can record multiple phone calls.

"Say you've successfully recorded a bunch of people's meetings through their compromised laptops in WAV (format)," Wei says in a post. "Maybe there's some goodies in these files -- passwords, company secrets, operations, future plannings."

 

 

A speech recognition service can then be used to automatically locate the valuable data by keyword search.

"The quality of your results depends on several things: How clearly the sound was captured, how many keywords you're searching, etc."

The function was accidentally killed off a year ago thanks to a typo which remained unntoiced until recently.

It can be downloaded via Github.

Copyright © SC Magazine, Australia


Search phone calls for keywords with Metasploit
 
 
 
Top Stories
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
Five emerging technologies that will transform financial services
[Blog post] Far out ideas that aren't far off.
 
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  28%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 946

Vote