This project is now defunct. Code has been updated to alert you that it's not working because of captcha. If captcha is ever removed, Zoombo will once again work. Zoombo might still work before captcha kicks in if you get lucky.
Not responsible for misuse. Please don't be an asshole.
It's a Zoom meeting cloud-share brute force cracker and automatic video file downloader.
- When acquiring Slack tokens during Red Team engagements, or gaining access to a user's slack instance, you can then search for
zoom.us/rec/share
orzoom.us/rec/play
links and then, if they're password-protected, brute-force access. - When finding a password-protected Zoom share during pentests, you'll want to be able to brute force the share.
- I've purposely not included any threading or optimization, but you can crack as many links as you can dump into
meetings.txt
. That means if you've got 20 links, run it and go afk.
There are a couple options you can take to defend yourself right now.
- Use authenticated shares instead of passwords. Lock it down to SSO with Multi-Factor Authentication requirements.
- Set a random password for recorded shares that you no longer want, then delete it. This kills the previous S3 bucket links and prevents others from getting a new link easily. However, the video appears to persist in the bucket for 3-4 hours, similar to the way access to a normal video works; you just won't have the appropriate
Signature
, so you can't access it.
pip3 install -r requirements.txt
docker build -t zoombo .
https://{org}.zoom.us/rec/share/{id}
https://{org}.zoom.us/rec/share/{id}
https://{org}.zoom.us/rec/share/{id}
Note that the {org}
info is just an example of what the target org could be, e.g.: zoomorg
. Then the {id}
is the 54-character share token at the end of the URL.
line
separated
password
list
python3 zoombo.py -m meetings.txt -w rockyou.txt
$ python3 zoombo.py -h
usage: zoombo.py [-h] -m MEETINGS -w WORDLIST
optional arguments:
-h, --help show this help message and exit
-m MEETINGS, --meetings MEETINGS
A list of recording URLs to crack. e.g.: --meetings
company-a.txt
-w WORDLIST, --wordlist WORDLIST
Any wordlist with passwords. e.g.: --wordlist
rockyou.txt