ESPloitV2 icon indicating copy to clipboard operation
ESPloitV2 copied to clipboard

Appearance

Open AlistairXX opened this issue 8 years ago • 7 comments
trafficstars

Make some new tabs,colours and style to your page

AlistairXX avatar Sep 18 '17 04:09 AlistairXX

It can't behave as a twin duck right??

AlistairXX avatar Sep 18 '17 04:09 AlistairXX

Could it be incorporated with mmc so it behaves like USB / UFD, with the intent of camouflage also storage of payload or minimal data.

ChandraOrbit avatar Sep 28 '17 02:09 ChandraOrbit

At the moment the option of adding a mmc is not in consideration. It will encrease price and volume. Which will lead in looking for another USB case. That will encrease the price even more. Overall the ratio benefit/time wasted is not worth it.

WHID was mainly created to wraponize usb gadgets or deployed by the attacker itself. The twin ducky style was not considered intentionally.

P.s. the original repo for Hardware related questions (i.e. Cactus WHID) is https://github.com/whid-injector/WHID

whid-injector avatar Sep 28 '17 03:09 whid-injector

Also right now in software if the victim and device are connected to the same network there are several WiFi based exfiltration options HTTP and FTP and a login credential phisher, see the ESPloit readme.

exploitagency avatar Sep 28 '17 05:09 exploitagency

Is it possible to automatically connect to victim's network? I tried but could not and had to configure it manually with condition of knowing the condition of password, IP and SSID.

ChandraOrbit avatar Sep 28 '17 05:09 ChandraOrbit

You need to be on the same network for those exfiltration methods to work, meaning you need access to their WiFi credentials, so crack it before hand or much easier just do the reverse and have the victims pc connect to the esploit device's network when its running as an access point, see the exfiltration page when connected to the esploit web ui, I believe I show some examples of how to do this. You can also exfiltrate to an online alternative like pastebin instead of straight to the device running esploit.

exploitagency avatar Sep 28 '17 08:09 exploitagency

This issue has gone way off course but here is an example of commands to force the victim to connect to ESPloit's network when in access point mode.

Windows: netsh wlan set hostednetwork mode=allow ssid="SSID-HERE" key="WIFI-PASSWORD-HERE" Linux: nmcli dev wifi connect SSID-HERE password WIFI-PASSWORD-HERE

exploitagency avatar Sep 28 '17 08:09 exploitagency