Giter Site home page Giter Site logo

Appearance about esploitv2 HOT 7 OPEN

exploitagency avatar exploitagency commented on August 15, 2024
Appearance

from esploitv2.

Comments (7)

AlistairXX avatar AlistairXX commented on August 15, 2024

It can't behave as a twin duck right??

from esploitv2.

ChandraOrbit avatar ChandraOrbit commented on August 15, 2024

Could it be incorporated with mmc so it behaves like USB / UFD, with the intent of camouflage also storage of payload or minimal data.

from esploitv2.

whid-injector avatar whid-injector commented on August 15, 2024

At the moment the option of adding a mmc is not in consideration.
It will encrease price and volume. Which will lead in looking for another USB case.
That will encrease the price even more.
Overall the ratio benefit/time wasted is not worth it.

WHID was mainly created to wraponize usb gadgets or deployed by the attacker itself.
The twin ducky style was not considered intentionally.

P.s. the original repo for Hardware related questions (i.e. Cactus WHID) is https://github.com/whid-injector/WHID

from esploitv2.

exploitagency avatar exploitagency commented on August 15, 2024

Also right now in software if the victim and device are connected to the same network there are several WiFi based exfiltration options HTTP and FTP and a login credential phisher, see the ESPloit readme.

from esploitv2.

ChandraOrbit avatar ChandraOrbit commented on August 15, 2024

Is it possible to automatically connect to victim's network? I tried but could not and had to configure it manually with condition of knowing the condition of password, IP and SSID.

from esploitv2.

exploitagency avatar exploitagency commented on August 15, 2024

You need to be on the same network for those exfiltration methods to work, meaning you need access to their WiFi credentials, so crack it before hand or much easier just do the reverse and have the victims pc connect to the esploit device's network when its running as an access point, see the exfiltration page when connected to the esploit web ui, I believe I show some examples of how to do this. You can also exfiltrate to an online alternative like pastebin instead of straight to the device running esploit.

from esploitv2.

exploitagency avatar exploitagency commented on August 15, 2024

This issue has gone way off course but here is an example of commands to force the victim to connect to ESPloit's network when in access point mode.

Windows: netsh wlan set hostednetwork mode=allow ssid="SSID-HERE" key="WIFI-PASSWORD-HERE"
Linux: nmcli dev wifi connect SSID-HERE password WIFI-PASSWORD-HERE

from esploitv2.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.