Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
I get the animation and the graphs (network tab on dev tools chrome) when The pi zero (PT) is plugged in (win10 laptop)
When i check the poisontap folder afterwards on the pi zero, I have a "poisontap.cookies.log" but all it contains is a date and hour and
"poisontap is listening"
Where are the cookies?
Should i do something on the laptop?
On the server side (a raspberry pi 3), i'm having the problem that no websocket is being openend, but i thought, there would be cookies locally on the pi zero without the server side working?
I get the animation and the graphs (network tab on dev tools chrome) when The pi zero (PT) is plugged in (win10 laptop) When i check the poisontap folder afterwards on the pi zero, I have a "poisontap.cookies.log" but all it contains is a date and hour and "poisontap is listening"
Where are the cookies? Should i do something on the laptop?
On the server side (a raspberry pi 3), i'm having the problem that no websocket is being openend, but i thought, there would be cookies locally on the pi zero without the server side working?