Search phone calls for keywords with Metasploit

Powered by SC Magazine
 

Find passwords, company secrets in tapped conversations.

A largely unknown function within the Metasploit framework has been upgraded that allows phone calls to be recorded and then trawled for sensitive information.

The powerful microphone recording function has existed for about two years and is helpful to penetration tests yet is rarely used.

Rapid7 MetaSploit developer Wei Chen, known as Sinn3r, says the feature was upgraded two weeks ago from a basic meterpreter command to a cross-platform post module which can record multiple phone calls.

"Say you've successfully recorded a bunch of people's meetings through their compromised laptops in WAV (format)," Wei says in a post. "Maybe there's some goodies in these files -- passwords, company secrets, operations, future plannings."

 

 

A speech recognition service can then be used to automatically locate the valuable data by keyword search.

"The quality of your results depends on several things: How clearly the sound was captured, how many keywords you're searching, etc."

The function was accidentally killed off a year ago thanks to a typo which remained unntoiced until recently.

It can be downloaded via Github.

Copyright © SC Magazine, Australia


Search phone calls for keywords with Metasploit
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 334

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 139

Vote