Search phone calls for keywords with Metasploit

Powered by SC Magazine
 

Find passwords, company secrets in tapped conversations.

A largely unknown function within the Metasploit framework has been upgraded that allows phone calls to be recorded and then trawled for sensitive information.

The powerful microphone recording function has existed for about two years and is helpful to penetration tests yet is rarely used.

Rapid7 MetaSploit developer Wei Chen, known as Sinn3r, says the feature was upgraded two weeks ago from a basic meterpreter command to a cross-platform post module which can record multiple phone calls.

"Say you've successfully recorded a bunch of people's meetings through their compromised laptops in WAV (format)," Wei says in a post. "Maybe there's some goodies in these files -- passwords, company secrets, operations, future plannings."

 

 

A speech recognition service can then be used to automatically locate the valuable data by keyword search.

"The quality of your results depends on several things: How clearly the sound was captured, how many keywords you're searching, etc."

The function was accidentally killed off a year ago thanks to a typo which remained unntoiced until recently.

It can be downloaded via Github.

Copyright © SC Magazine, Australia


Search phone calls for keywords with Metasploit
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 440

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 211

Vote