poisontap icon indicating copy to clipboard operation
poisontap copied to clipboard

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

Results 90 poisontap issues
Sort by recently updated
recently updated
newest added

Hi, I have tried to get this to work upon boot but not having any luck... I have followed these instructions: > Setup startup script: sudo cp /home/pi/poisontap/pi_startup.sh /etc/init.d/ &&...

Hi, I'm getting a bunch of SyntaxErrors thrown by NodeJS when trying to run the backend_server.js on my server. I've tried the repo I pulled yesterday, and then re-cloned the...

Block USB ethernet gadgets (tested with pi zero, but I believe this would block all usb Ethernet gadgets) go into mmc.exe and add Group Policy Object Editor plugin (Local Computer)...

Not an issue but a question/suggestion. Is there any way to interact directly with you and others community's members ? We could exchange some infos and improve this wonderful tool.

Is there any automated method to remove the persistent backdoors from a machine, either remotely or via plugging the device into the target machine(s) again? More of a feature request...

enhancement

The DNS rebinding feature of poisontap depends on using your custom DNS server on `ip.samy.pl`. Given that the [second stage of the DNS rebinding attack](https://github.com/samyk/poisontap/blob/98f77da1e51b967e54be506f10c34de3b3aacd75/target_injected_xhtmljs.html#L66-L74) uses the domain to inject...

There's various kexts that are responsible for USB ethernet/networking: /System/Library/Extensions/AppleUSBEthernet.kext /System/Library/Extensions/AppleUSBNetworking.kext /System/Library/Extensions/AppleUSBEthernetHost.kext

Hey, Thanks for this great tool. What about a Responder support to harvest credentials from Windows/OSX (https://room362.com/post/2016/snagging-creds-from-locked-machines/)? Regards,

@samyk et al, well done! Is there a donation address to support your research? Super important in upgrading worldwide security. particularly distributing the code. Making it a very real threat...