poisontap icon indicating copy to clipboard operation
poisontap copied to clipboard

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

Results 90 poisontap issues
Sort by recently updated
recently updated
newest added

What should I fill in at ws://YOUR.DOMAIN:1337 I mean, do you have to set something up or can you just fill in something??

I really am not getting it. I tried all my best but neither the backend server with websockets nor the cookie harvesting on the pi are working correctly. I am...

Hello do there is a way to delete poisontap forever after launched on a Mac ? Thank you

Hi there, my PoisonTap installation and everything works fine. But could someone help me with the creation of a logfile, please? In target_backdoor.js there is a log.php mentioned, which is...

Having issues with rc.local. Finally figured out how to get the pi zero to show up ethernet thanks to this: https://gist.github.com/gbaman/50b6cca61dd1c3f88f41 Now it takes over the dns but nothing is...

Hi, I've configured Backdoor.html and target_injected_xhtmljs.html to connect my public server. The server is correctly running backend_server.js etc etc etc. The problem is, when I disconnect the Raspberry Pi Zero...

Have you tried to force feed a windows 'victim' a WPAD response to get some of that sweet https action?

I'm doing a pentest for my company and in the meanwhile i'm trying to experiment some new physical attacks involving USB ports as attack vectors. The workstation that I'm testing...

Hello, I congratulate you on this work. I only encounter a problem when booting: I plug the Raspberry Pi Zero with all the program installed, but nothing happens ... I...

Hi, First of all, thanks a lot for this amazing project! However, I couldn't for the life of me make it work on Windows 10. Even with the IBM 0x04b3...