RoganDawes / P4wnP1_aloa

P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".
GNU General Public License v3.0
3.73k stars 497 forks source link

Trouble reverse engineering original P4wnP1 to ALOA #100

Open Mahendd opened 5 years ago

Mahendd commented 5 years ago
The original P4wnP1 had some AMAZING demo payloads(mainly HID_Backdoor and the windows lockpicker) but the current ALOA has much better scripting, therefore, ideally, the user should be able to get the best of both worlds, and while that could, maybe, be accomplished by installing both versions(not that I have any idea of what would happen), a probably much better idea is to reverse engineer the original payloads, and that's what I decided to do.
However, it soon proved to be quite harder than my inexperienced me thought it was due to the connection between multiple files and dlls(some of which even apparently had unrecognizable characters, possibly German).
So here it comes to the actual issue: Has anyone ever "translated" the payloads? Is anyone trying to? Am I missing something on the readme or the files?
Or if anyone is more experienced, be it on reverse engineering or even the P4wnP1 itself, could you give me tips towards finding what I seek? Thank you.
mame82 commented 5 years ago

P4wnP1 A.L.O.A. could accomplish every task, which was accomplished by P4wnP1.

The only exception is the HIDBackdoor, which was a seperate piece of software. The reason I haven't ported it to A.L.O.A. (yet), is that the backdoor server heavily relied on the old HID scripting language (python parser for DuckyScript vs new JavaScript based interpreter).

Anyways, there's not much to reverse, as the whole backdoor was open sourced

mame82 commented 5 years ago

Client

https://github.com/mame82/P4wnP1_HID_backdoor_client

mame82 commented 5 years ago

Server

https://github.com/mame82/P4wnP1/tree/master/hidtools/backdoor