• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      Hacking Webcams & Microphones

      • Posted by Kalyani Rajalingham
      • Date December 19, 2021

      Whether you want to catch criminals in the act, or see what you can gather about them for the cops, one important part of hacking is accessing webcams and microphones. There are so many ways in which you can actually do this, but the easiest of them all is by using Storm-Breaker. Storm breaker can get information of any device without any permissions, it can access smartphone location, grab OS passwords, access webcam, and lastly access microphones. In this tutorial, we’ll learn to access webcams, and microphones, grab smartphone locations, as well as grab OS passwords.

      Step #1: Installing Storm Breaker

      First, let’s install Storm Breaker.

      git clone https://github.com/ultrasecurity/Storm-Breaker
      cd Storm-Breaker
      sudo bash install.sh
      python3 -m pip install -r requirments.txt

      Step #2: Installing Ngrok

      In order for Storm Breaker to work, we also need to install ngrok. First, you need to sign up for an ngrok account at https://dashboard.ngrok.com/login. Once you sign up for an ngrok account, a dashboard will open up with instructions as well as a download link. Download ngrok, and extract it into the Storm-Breaker folder. Make sure that the ngrok is in the Storm-Breaker folder!!! Now use the terminal to do the following:

      cd Storm-Breaker
      ./ngrok authtoken [token]

      Here, replace [token] with the token that the ngrok site gives you. Now you’re ready to start Storm-Breaker.

      Step #3: Starting Storm-Breaker

      In order to start Storm-Breaker, you must be root. So you might as well login in as root, and then type:

      sudo su
      python3 Storm-Breaker.py

      Once Storm-Breaker is started, you’ll have 6 options. The 5th and 6th options are the settings and the exit options, so we’ll omit those. The options are as follows:

      1. Access Webcam
      2. Access Microphone
      3. OS Password Grabber (WIN 10)
      4. Get Location [Smartphones]
      5. Settings
      6. Exit

      Accessing the Webcam and microphone

      First, let’s access the webcam. In order to access the webcam, you must enter the number 1 into the console, and press enter. You’ll get 3 options, I’m going to try to access the camera of a smartphone so I’ll pick option 2.

      1. Default
      2. Mobile Camera
      3. Avatar X-Men

      So, it’ll give you a link. In my case, it looks something like this:

      https://6375142-118-155-103.ngrok.io --> https://localhost:4545

      Now, the link you want to use is the first one (https://6375142-118-155-103.ngrok.io).

      The next line after the link is “Please send link to your target”. So we have to send it to our target! Open gmail, and craft an email and add the link. Or SMS the link to your target. Once they open the link, you’ll get nice photos!

      Once they open the link, you’ll get their IP address, their system information, as well as nice photos taken by their camera!! These photos will be stored at /Storm-Breaker/webcam/images.

      If you are successful, then you should get a screen like this (I’ve blurred out my IP address, and OS Name)

      You may notice that it says “Image Received Place Check /images Folder”. This is where it will tell you where to check for the files it has collected!

      In order to access the microphone, you’d have chosen option 2, instead of 1, but the rest of the process is still the same. You’ll get to choose a template, and you’ll get a link which you have to send to the target. Here, the data collected will be stored in the /Storm-Breaker/microphone/play folder.

      Accessing OS Passwords

      The next thing we’ll be accessing is OS Password. For this, we select option 3. You should immediately get a link much like for the webcam. Send this link to your target.

      When the person opens this link, they will be asked to click on another link that will simulate a windows login. It looks real enough, and when they enter their password in order to login, the password will appear on your terminal’s screen.

      I have erased the IP and the actual password from the image below:

      Accessing Locations

      Accessing locations is no different from accessing webcams. We simply choose option number 4. Here, you’ll get two different templates, a nearyou and a weather template. You can pick one. I’ll pick the weather template.

      1. Nearyou
      2. Weather

      Once again, you’ll get a link that you can send to your target. If they click on it, then you should get location information of your screen.

      Hacking is not always easy, it takes time, patience, and knowledge of lots and lots of techniques. However, with Storm-Breaker, hacking has just become simple. It’s as simple as installing a few components, and firing it up. Once it’s up and running, you’ll get the option of hacking into a variety of things including webcams, and microphones. Always remember to work with the force (police, and federal agents), not against.

      Happy Hacking!

      • Share:
      Kalyani Rajalingham
      Kalyani Rajalingham

      I'm from Sri Lanka (live in Canada), and am a Linux and code lover.

      Previous post

      Generate FUD Keyloggers In Minutes!
      December 19, 2021

      Next post

      ARP Poisoning Attack Demonstration
      December 23, 2021

      You may also like

      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023
      Common-Authentication-Bypass-Techniques_370x208
      Common Authentication Bypass Techniques
      16 March, 2023

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance