samyk / poisontap

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
https://samy.pl/poisontap/
6.22k stars 993 forks source link

cookies cookies cookies #58

Open emboha opened 7 years ago

emboha commented 7 years ago

I get the animation and the graphs (network tab on dev tools chrome) when The pi zero (PT) is plugged in (win10 laptop) When i check the poisontap folder afterwards on the pi zero, I have a "poisontap.cookies.log" but all it contains is a date and hour and "poisontap is listening"

Where are the cookies? Should i do something on the laptop?

On the server side (a raspberry pi 3), i'm having the problem that no websocket is being openend, but i thought, there would be cookies locally on the pi zero without the server side working?

msolefonte commented 7 years ago

I read something about you need node v6 (look it with "node -v") to solve that problem. But i am not secure, so i hope I can help