P4wnP1

@P4wnP1

USB attack framework on Raspberry Pi0W created by

Vrijeme pridruživanja: kolovoz 2017.

Tweetovi

Blokirali ste korisnika/cu @P4wnP1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @P4wnP1

  1. Prikvačeni tweet
    6. pro 2018.

    Merry Christmas! Pre-built P4wnP1 A.L.O.A. image (successor of P4wnP1) is online at ...

    Prikaži ovu nit
    Poništi
  2. prije 15 sati
    Poništi
  3. proslijedio/la je Tweet
    prije 15 sati

    No goodbye without a small gift: Pushed P4wnP1 A.L.O.A. version 0.1.1-beta - Bumps to KALI 2020.1 - add additional keyboad layouts - fix existing layouts - other bugfixes (This prepares handover of the repo to a new maintainer) Be sure to update:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj
    Odgovor korisniku/ci

    I’ll be sharing maintainer duties with , a prolific hacker, and creator of WHID and WHIDElite.

    Poništi
  5. 3. velj

    Ownership transfer of my projects started with - P4wnP1 (legacy) - LOGITacker - munifying ... to one of my Gurus and earliest InfoSec idols: Mr. !!!

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Dear friends, followers, InfoSec enthusiasts, I AM OUT FOR A WHILE! I will take a break from all public work, as I need more time for my beloved ones. This will affect projects like P4wnP1, P4wnP1 ALOA, LOGITacker and BLExy, as well ass all pending invitations to conferences.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    25. sij

    Update the list of current USB cables with implants for keystroke injection attacks & more

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    18. sij

    Ordered a couple of ⁦⁩ R1S routers to test as an Ethernet PitM dropbox, etc. Wonder how easy it will be to port ⁦⁩ to it, could make a nifty general purpose hackbox, with USB Device Controller!

    Poništi
  9. 17. sij

    Custom USB cable serves as wireless transceiver for remote shell on **offline** Windows machine and transmits password input into a fake Win10 lock screen

    Poništi
  10. proslijedio/la je Tweet
    6. sij

    BLExy Bluetooth LE Proxy dev video: Current firmware auto-patches Nordic softdevice to allow attribute table access. Demo shows intercepted traffic of a cloned BLE mouse, paired with LESC and reworked log output in WebUI (running in Chrome). 1080p:

    Poništi
  11. proslijedio/la je Tweet
    26. pro 2019.

    Mashable: Autonomous with UPS v1.1 lite , no more boot time

    Poništi
  12. proslijedio/la je Tweet
    20. pro 2019.

    Was pointed to this awesome Pi0W based multi-purpose gadget by Worth having a look at

    Poništi
  13. 17. pro 2019.

    If only P4wnP1 would fit into an USB Type A plug 🤣

    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.

    USBSamurai Pro 😉 USB cable with implant for bi-directional RF communication connects mobile phone in airplane mode, with Win10 box (no network connections). 2nd mobile injects keystrokes and brings up a covert channel shell, using the RF implant. File transfer still works

    Prikaži ovu nit
    Poništi
  15. 12. pro 2019.

    Had to take a longer break from P4wnP1 development this year. Here's a small excuse: My talk on exploitation of Logitech wireless input devices ... and yes, it includes air gap bridging once more

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    Very cool multi-OS reverse shell setup for P4wnP1 A.L.O.A. No idea how did it. Maybe nmap's OS detection ? ... I have no idea, but it does its job pretty fast. Respect 👍🤘

    Poništi
  17. proslijedio/la je Tweet
    9. pro 2019.

    Auto OS Detect Reverse Shell against macOS and Windows OSes using 's

    Poništi
  18. proslijedio/la je Tweet
    2. pro 2019.

    I wrote a thing about getting shells through Logitech Unifying dongles. Let me know what you think!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    29. stu 2019.

    Wanna get a deep-dive into exploitation of Logitech wireless peripherals (incl. keyboard eavesdropping and remote shells in air gap targets)? Slides and demo videos from talk published here: Have fun, stay safe

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    27. stu 2019.

    Autonomous with UPS v1.1 lite , no more boot time

    Poništi
  21. proslijedio/la je Tweet
    21. stu 2019.

    Dev recording: How I think Bluetooth LE interception should be done in future... - use a 10$ dongle for MitM - a GUI to live-edit interception behavior + CLI for custom output - store result on dongle and let it do its job Example: swap keys of a clicker

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·