[sc name=”ad_1″]
Take webcam shots from target just sending a malicious link.
How it works?
The tool generates a malicious HTTPS page using Serveo or Ngrok Port Forwarding methods, and a javascript code to cam requests using MediaDevices.getUserMedia.
The MediaDevices.getUserMedia() method prompts the user for permission to use a media input which produces a MediaStream with tracks containing the requested types of media. That stream can include, for example, a video track (produced by either a hardware or virtual video source such as a camera, video recording device, screen sharing service, and so forth), an audio track (similarly, produced by a physical or virtual audio source like a microphone, A/D converter, or the like), and possibly other track types.
See more about MediaDEvices.getUserMedia() here
To convince the target to grant permissions to access the cam, the page uses a javascript code made by https://github.com/wybiral that turns the favicon into a cam stream.
Installing (Kali Linux/Termux):
git clone https://github.com/thelinuxchoice/saycheese
cd saycheese
bash saycheese.sh
[sc name=”ad-in-article”]
Klone nach ‘saycheese’ …
Username for ‘https://github.com’:
waht is the paswd
Simply type what u want, for example termux saycheese GitHub in browser, then change it to desktop mode and simply download, copy paste file from download to termux home folder, unzip it and saycheese