RoganDawes / P4wnP1_aloa

P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming and physical engagements ... or into "A Little Offensive Appliance".
GNU General Public License v3.0
3.72k stars 493 forks source link

os detection #177

Open learningsomethingnewanduseful opened 4 years ago

learningsomethingnewanduseful commented 4 years ago

i want to add something like this https://github.com/hak5/bashbunny-payloads/pull/384 to p4wnp1 aloa but i don't really know how. already tried it couple times but cant get it working. this is what i also found from bash bunny. https://github.com/hak5/bashbunny-payloads/blob/master/payloads/extensions/get.sh

21weberer commented 4 years ago

given that P4wnP1 ALOA is meant to emulate a keyboard, mouse and usb storage device, it might be difficult. I have been thinking about this for some time now, and I know it is not a great method, but to differentiate Windows from OSX, maybe there could be a script monitoring for LED changes, and another could toggle NUM lock, as with HIDScript, you cant use the waitledrepeat code, as it dosen't work with OSX. Probably woulden't help with linux, but it could be a start.

mame82 commented 4 years ago

The bashbunny script linked above utilizes nmap OS fingerprinting.

I can't recommend this for two reasons:

1) It is active TCP/IP communication to the target and thus "loud". 2) Results aren't reliable.

Now if you want to use it anyways, it is pretty easy, because:

SymbianSyMoh commented 4 years ago

@learningsomethingnewanduseful Check this script out https://github.com/SymbianSyMoh/P4wnP1-ALOA-Payloads/blob/master/pwnpi-OSAutoDetect.sh