exploitagency / ESPloitV2

WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, and PASV FTP exfiltration methods and an integrated Credential Harvester Phishing tool called ESPortal.
MIT License
559 stars 133 forks source link

Exfiltrating Data block #8

Closed ChandraOrbit closed 7 years ago

ChandraOrbit commented 7 years ago

Exfiltrating Data

I tried this feature but there are constraints that is when the router is used by the target attached firewall (in my trial using mikrotik router) EsploitV2.5.3 can not upload files to list exfiltrade data using FTP

is there a solution or a way that can solve the problem?

exploitagency commented 7 years ago

Two ways, think outside of the box.

Run ESPloit in access point mode, force the victim to connect to our access point, then you obviously bypass their routers firewall(although not one locally on their pc), exfiltrate.

Other option use HTTP exfiltration method.

So FTP works fine for you otherwise right? If you dont use the proper modified FTP library as in instructions then it will not work in access point mode.

exploitagency commented 7 years ago

One more note. It supports PASSIVE mode FTP only! See example payloads for something verified to work.

ChandraOrbit commented 7 years ago

I just realized that this is PASSIVE mode FTP only, thanks for enlightenment

exploitagency commented 7 years ago

See the demo payloads for some ideas. I will update documentation to reflect this when I get a chance.

exploitagency commented 7 years ago

Updated docs