Penetration Testing mailing list archives
RE: Covert Microphone Application
From: "Miguel Valentin" <valentinousn () verizon net>
Date: Thu, 27 Jul 2006 08:10:48 -0400
Why can't I ever find a challenge like this!! I could sure another laptop!! Got 3 so far and one more wouldn't hurt!! If you can install pcAnywhere on it you should be able to get your wish. Or use another desktop or laptop somewhere else to telnet into either via Windoze itself or with a Linux CD. I'd recommend using Knoppix. What kind of laptop is it?? Good luck and hope you win. -----Original Message----- From: Shenk, Jerry A [mailto:jshenk () decommunications com] Sent: Thursday, July 27, 2006 7:00 AM To: shiri_yacov () yahoo com; pen-test () securityfocus com Subject: RE: Covert Microphone Application Can you terminal services into the laptop? If you can, just start the built-in recorder. One way or another, you need access to the laptop. Back Orifice has recording capabilities built in but that will trigger AV monitoring. You have a pretty simple task...don't muddy it up trying to get too fancy...just use the built-in stuff. -----Original Message----- From: shiri_yacov () yahoo com [mailto:shiri_yacov () yahoo com] Sent: Wednesday, July 26, 2006 5:55 AM To: pen-test () securityfocus com Subject: Covert Microphone Application Hi all, I have recently entered with my boss to our corp. conference room to discover a new (shining) internet laptop on a side desk in the room. During our chat I mentioned that the laptop has a builtin microphone and therefore enables covert eavsdropping in case the laptop is "ruled" from remote position, and therefore, a conference room PC should have no builtin mic. My sceptic boss replied instantly - "I challange you, bring me a recording of any meeting - I`ll replace the laptop, and you`ll receive it." I therefore need a small covert application (no need in process hiding), which will record microphone input to file. command line application is perfect. Do any of you know any ? Guys, I gotta have this laptop... Regards, Shiri ------------------------------------------------------------------------ ------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------ ------ **DISCLAIMER This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message. If you have received this communication in error, please notify the sender and delete this e-mail message. The contents do not represent the opinion of D&E except to the extent that it relates to their official business. ---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Covert Microphone Application, (continued)
- Re: Covert Microphone Application Ralph Forsythe (Jul 27)
- Re: Covert Microphone Application Tonnerre Lombard (Jul 29)
- Re: Covert Microphone Application Volker Tanger (Jul 30)
- Re: Covert Microphone Application Matt Burnett (Jul 31)
- Re: Covert Microphone Application Aaron (Jul 31)
- Re: Covert Microphone Application Ralph Forsythe (Jul 27)
- Re: Covert Microphone Application Matt Burnett (Jul 29)
- RE: Covert Microphone Application Miguel Valentin (Jul 27)
- Re: Covert Microphone Application s-williams (Jul 27)
- Re: Covert Microphone Application Mike Kuriger (Jul 29)
- RE: Covert Microphone Application Craig Wright (Jul 29)
- RE: Covert Microphone Application Craig Wright (Jul 31)