P4wnP1
P4wnP1 copied to clipboard
P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.
Not sure if this is a good fit, but a MITM6 payload would probably be a good idea. Just getting started looking into this repo, but it looks very promising....
I wan to know if i can connect the P4wnP1 as **USB Wifi Adapter** to Kali Linux so i can perform some attacks on network ?
In at least half of my tries, the payload grabs hashes that start with the computername instead of the username. My guess is that those hashes are from a local...
line 203 of install.sh references /home/pi/P4wnP1/boot/init_bt.sh when creating the service file. This is an issue when you don't actually install P4wnP1 to the pi's home directory. Please change to $wdir/boot/initi_bt.sh...
The gadget names and hostname are hardcoded to a value one would not necessarily want to. Especially the gadget name set to something that recognisable will make all DLP products...
the install.sh script creates an autologon service (lines 228-230 if install.sh) file that is hardcoded to user pi, rather than taking the actual user the script is currently run from
https://gist.github.com/hahnstep/d56f2219a8d164c0c912c8de257fd619
The USE_HID_TEST Feature seems to be not working on OSX, as it seems like, there is only a backchannel message for Capslock. Is there an option to change the key/event?...
(almost) Everyone knows about SpaceHuhn's WiFi-Ducky, and his Web Interface. I believe that P4wnP1 would benefit from something similar to this. It would be helpful for those that use it...