An (un-)ethical hacking-station based on Raspberry Pi and Python. OS: Raspbian Images: Remo Eisner
The SpyPi is a white-hat hacking-station I've created as part of my high school graduation-work (2017). The device aims at raising awareness of data protection by letting people interactively get in touch with the topic. The SpyPi provides different applications which help the user to learn about the risks of everyday tasks/activities involving technologies such as networks, contactless payment or social media. The interactive aspect allows user and SpyPi to meet at eye-level. To schoolmasterly educate about data protection would only kill interest and insight at birth. The hacking-station is meant to be an on-going project. Its applications and the hardware can be expanded and improved by the user or creator.
Whether the hacking-station is ethical or unethical is entirely dependent upon the operator. It's simply out of my control (although SpyPi is thought to be an ethical device).
If you are interested in the hardware, please visit my website (coming soon).
SpyPi is a high school project and was created with very little programming experience. Don't expect flawless code. Constructive criticism is appreciated! Parts of the code are written in German. I'll translate it as soon as possible.
The Project is licensed under the Apache License 2.0.
Gets basic information about surrounding networks such as the BSSID, ESSID, encryption and authentication type.
Allows user to attack a network with a custom or pre-made password list.
Tests out whether a Mifare Classic 1K card uses any default read-permission keys.
Catches formular data from HTTPS POST requests by the SpyPi-AP (transparent proxy) client. Every "chatch" is stored in a file (with it's host and time of request).
Mines incoming Tweets containing a certain string (word, hashtag...) the user chooses himself. Collects Data until Ctrl + C
sudo python3 scanner.py
sudo python3 Bruteforce.py
Make sure you've...
- installed mitmproxy, Python 3.5 or above (I suggest pyenv) and OpenSSL 1.0.2 via Jessie Backports
- created a wireless AP following this tutorial
- created a text file named proxy.txt
Open two terminal windows or split screen:
Window 1:
tail -f proxy.txt
Window 2:
Set iptable rules:
sudo iptables -F
sudo iptables -t nat -A POSTROUTING -o wlan1 -j MASQUERADE
sudo iptables -A FORWARD -i wlan1 -o wlan0 -m state — state RELATED,ESTABLISHED -j ACCEPT
sudo iptables -A FORWARD -i wlan0 -o wlan1 -j ACCEPT
sudo iptables -t nat -A PREROUTING -i wlan0 -p tcp — dport 80 -j REDIRECT — to-port 8080
sudo iptables -t nat -A PREROUTING -i wlan0 -p tcp — dport 443 -j REDIRECT — to-port 8080
run:
mitmdump ~s "/home/pi/login_proxy.py" -T --host
sudo python mifare.py
Make sure you've created your own Twitter application and inserted the keys in the key.py file.
sudo python3 twitter-mining.py