exploitagency / ESPloitV2

WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, and PASV FTP exfiltration methods and an integrated Credential Harvester Phishing tool called ESPortal.
MIT License
558 stars 136 forks source link

FingerprintUSBHost implementation to detect OS #50

Open joelsernamoreno opened 5 years ago

joelsernamoreno commented 5 years ago

Added FingerprintUSBHost library.

New command "GetOS:"

When you execute the command "GetOS:" in the textarea or in a payload, the file OS.txt will appear in the Exfiltrate section.

Inside that file you will find the operating system of the computer where the ESPloitV2 device is connected.

Tested with WHID Injector on Linux and Windows.

whid-injector commented 5 years ago

This is a local fork of ESPloitV2 since there are some PR unapproved on exploitagency/ESPloitV2 that I would like to see merged. If you have PRs and don't get approved on Corey's repo, do make them here: https://github.com/whid-injector/WHID/tree/master/ESPloitV2_whid Thanks.