I would like to build a network bugging device that can be connected to any Ethernet network and grants the attacker access through a reverse VPN.
Since we don't want to go to jail the attacker's VPN server would be a Tor hidden service and the buggin device would perform a reverse connection over Tor. No direct connection to the attacker's IP address will ever be made.
All traffic between the attacker and the device will be encrypted by both Tor and the VPN.
It must be trivial for the attacker to route traffic from nmap
, w3af
, OpenVAS
, metasploit
and any other security tools through the VPN tunnel. Extra points if the VPN is Layer 2 and allows the attacker to run ARP-spoofing attacks (ssh layer 2 VPN?)
The device would be built on top of Raspberry Pi or any other "disposable" micro-computer.
- http://hackaday.com/2013/03/24/rogue-pi-a-rpi-pentesting-dropbox/
- http://securityaffairs.co/wordpress/15471/hacking/raspberry-pi-as-physical-backdoor.html
- http://www.tunnelsup.com/raspberry-pi-phoning-home-using-a-reverse-remote-ssh-tunnel
- Tor hidden service
- Detailed build and usage instructions
-
A docker image for the server, which starts the Tor service and VPN server:
docker run bug-server
-
A docker image which can be run in the rasperry pi:
docker run network-bug --server=<hidden-tor-domain>
- Why? For fun. Looks like a nice 2-3 day project to learn about Tor hidden services, raspberry pi and reverse VPNs.
- You working for CIA? Nope.
- Anyone built a similar device/software which uses Tor hidden services?
- Recommendations for VPN software to use?
- Want to help me build and test?
The attacker ip will be in the devise memory, right? It that's true it can be retrieved by someone with access to the device?