An adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for the purpose of listening into sensitive conversations to gather information.Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture audio. Audio files may be written to disk and exfiltrated later.
Create a file called test.wma, with the duration of 30 seconds
Supported Platforms: Windows
Name | Description | Type | Default Value |
---|---|---|---|
output_file | Path to the recording file being captured | Path | test.wma |
duration_hms | Duration of audio to be recorded (in h:m:s format) | Path | 30 |
SoundRecorder /FILE #{output_file} /DURATION #{duration_hms}
Supported Platforms: Windows
powershell.exe -Command WindowsAudioDevice-Powershell-Cmdlet