Access devices remotely with just one click from the victim!

In recent days there has been no end to the revelations about the surveillance of mobile phones in our country with the sophisticated Predator malware.

According to information we collected, his two most recent "hits". monitoring in Greece took place in July and concerned two prominent Greek businessmen.

Now it is quite easy for a simple user to create a tracking software, for free and without much effort and knowledge.

polhack

In today's guide, we'll show you how to get access to both the victim's camera and microphone for starters.

To achieve our purpose, we will use the program Storm-Breaker.

Storm-Breaker is an open source program , written in , with which we can gain access to the microphone, camera and other information of the system we will attack.

work3

First we will download our program from github with the following command and install all the necessary parameters for it to work properly. Then we'll run it:

$ git clone https://github.com/ultrasecurity/Storm-Breaker $ cd Storm-Breaker $ sudo bash install.sh $ sudo python3 -m pip install -r requirements.txt $ sudo python3 st.py
2

As we see in the image above, as soon as we run the program, some options appear and we choose which form of attacks we want to carry out.

Can we:

  • We get information of the victim's device but we don't have rights to it.
  • Access device location for smartphones .
  • Operating system passwords for Wndows10 computers.
  • Access to the web camera and the microphone, both of the smartphone and the computer.
3

As you can see in the image below, we will try to get him access of our victim. Below you will see the results which are really amazing.

ezgif 2 da6bac0223

Then we will see some information about the architecture and how the program works.

ezgif 2 1dc3c5bb88
ezgif 2 0851118a99

Our program can run on all Linux distributions, we tested it on Kali Linux as well as MacOS.

Below we will see a video guide about the installation and the use of the program:

Happy Hacking :)

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Predator, Storm-Breaker, iguru

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).