RE: Covert Microphone Application

From: Mermod, Denis (Denis.Mermod@EssexCorp.com)
Date: Thu Jul 27 2006 - 07:37:35 EDT


Remote into the laptop (use the standard remote software built in) and
activate the mic program. No fancy schmancy needed - I believe you can
remote in via RDC or via registry (find mic hive(s)) and turn them on.

Can you get two laptops?

Denis Mermod, MCP, NSA IAM
Information System Security Officer
Essex Corporation
9020 Junction Dr.
Annapolis Junction, MD 20701
dmermod@essexcorp.com
301-617-8916 (Office)
410-370-0227 (Cell)
301-688-2200 Pin 5441 (Pager)
-----Original Message-----
From: shiri_yacov@yahoo.com [mailto:shiri_yacov@yahoo.com]
Sent: Wednesday, July 26, 2006 5:55 AM
To: pen-test@securityfocus.com
Subject: Covert Microphone Application

Hi all,
I have recently entered with my boss to our corp. conference room to
discover a new (shining) internet laptop on a side desk in the room.
During our chat I mentioned that the laptop has a builtin microphone and
therefore enables covert eavsdropping in case the laptop is "ruled" from
remote position, and therefore, a conference room PC should have no
builtin mic.
My sceptic boss replied instantly - "I challange you, bring me a
recording of any meeting - I`ll replace the laptop, and you`ll receive
it."

I therefore need a small covert application (no need in process hiding),
which will record microphone input to file. command line application is
perfect.

Do any of you know any ?

Guys, I gotta have this laptop...

Regards,
Shiri

------------------------------------------------------------------------
------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the
Analyst's
Choice Award from eWeek. As attacks through web applications continue to
rise,
you need to proactively protect your applications from hackers. Cenzic
has the
most comprehensive solutions to meet your application security
penetration
testing and vulnerability management needs. You have an option to go
with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service
can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm
your
results from other product. Contact us at request@cenzic.com for
details.
------------------------------------------------------------------------
------

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:25 EDT