ESPloitV2 icon indicating copy to clipboard operation
ESPloitV2 copied to clipboard

FingerprintUSBHost implementation to detect OS

Open joelsernamoreno opened this issue 5 years ago • 1 comments

Added FingerprintUSBHost library.

New command "GetOS:"

When you execute the command "GetOS:" in the textarea or in a payload, the file OS.txt will appear in the Exfiltrate section.

Inside that file you will find the operating system of the computer where the ESPloitV2 device is connected.

Tested with WHID Injector on Linux and Windows.

joelsernamoreno avatar Aug 04 '19 13:08 joelsernamoreno

This is a local fork of ESPloitV2 since there are some PR unapproved on exploitagency/ESPloitV2 that I would like to see merged. If you have PRs and don't get approved on Corey's repo, do make them here: https://github.com/whid-injector/WHID/tree/master/ESPloitV2_whid Thanks.

whid-injector avatar Aug 05 '19 16:08 whid-injector