We covered different social engineering techniques in this blog in which we learned how an attacker gains access to a victim's sensitive information through tricking or manipulating.
In this article, we'll show you how social engineering can be far more dangerous and can control or access your hardware devices like cameras and mic very easily. We'll learn how to access the mic and grab recording files and you can read about camera access phishing on different blogs on this site.
You may also like to read: WishFish To Access Anyone Camera With Phishing
SayHello
A simple but critical social engineering tool allows an attacker to access a victim's device microphone by sending a link. When the victim opens the link, a pop-up permission request will appear in the browser to access the device's microphone. The victim will then be redirected to the original website without realizing anything has happened.
How To Setup
It's a simple Python script and doesn't require much effort to set up and use on your Linux terminal. You can use it by following these commands.
git clone https://github.com/d093w1z/sayHello
cd sayHello
bash sayhello.sh
Now you will see the SayHello banner on your terminal and select the port forwarding option that works for you.
After that, it will ask you for a redirection URL (where the victim will be redirected after opening the link). You can enter any URL you like. Once the victim clicks on your link, their system's IP address and user-agent details will be shown on your terminal and saved in the ip.txt file.
If the victim allows pop-up permissions, you will receive their real-time recordings and save them in your current location in the SayHello main directory.
Note: Performing any kind of cyber attack or being involved in such activity is considered a cybercrime. Use this information to protect yourself and your work.