Skip to content

Weaponizing a Raspberry Pi for pentesting, using Ansible Playbooks πŸ₯Š

License

Notifications You must be signed in to change notification settings

GiovanniBaccichet/dropbox-weaponizer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

30 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


Logo

Dropbox Weaponizer

Weaponizing a Raspberry Pi for pentesting, using Ansible Playbooks πŸ₯Š
Explore the docs Β»

Author πŸ‘¨πŸ»β€πŸ’» Β· Report Bug πŸͺ³ Β· Request Feature ✨

About The Project πŸ”

Let's begin by defining what a dropbox is and in which context can become useful.

A Dropbox, sometimes also called a Jump Box, is a small device that you can hide somewhere within the physical location that you are targeting. Getting the device into the location will sometimes take other skills, such as social engineering, or even a little breaking and entering, to get the device into the location. A Dropbox can also be a box sent by the Security Consultant firm to be installed on a network for pen testing from a remote location - Halton, W., Weaver, B., Ansari, J. A., Kotipalli, S. R., & Imran, M. A. (2017). Penetration Testing: A Survival Guide (1st ed.). Packt Publishing.

For this purpose, one of the best fits with respect to the hardware to use, is the Raspberry Pi Zero 2.

rpi-zero

(back to top)

Built With

  • Ansible: it is an open source community project sponsored by Red Hat, it's the simplest way to automate IT
  • Raspberry Pi OS

(back to top)

Features πŸ’£

Main features description (TBA).

tmux

(back to top)

Tools and Components

A brief summary of the primary tools that this Ansible Playbook is going to install and configure (dependencies are omitted):

Category Name Description Included
πŸ“‘ Aircrack-ng Suite TBA πŸ”΄
πŸ•Έ Bettercap TBA πŸ”΄
πŸ”’ fail2ban TBA 🟒
πŸ‘¨πŸ»β€πŸ’» git TBA 🟒
πŸ“‘ Kismet TBA πŸ”΄
πŸ‘¨πŸ»β€πŸ’» log2ram TBA 🟒
πŸ•Έ macchanger TBA πŸ”΄
πŸ•Έ Nmap TBA πŸ”΄
πŸ“‘ Probequest TBA πŸ”΄
πŸ“‘ Reaver TBA πŸ”΄
πŸ•Έ TCPdump TBA πŸ”΄
πŸ‘¨πŸ»β€πŸ’» Tmux TBA 🟒
πŸ”’ ufw TBA 🟒
πŸ“‘ Wifite TBA πŸ”΄
πŸ•Έ Wireshark TBA πŸ”΄
πŸ‘¨πŸ»β€πŸ’» Zsh TBA 🟒

πŸ•Έ Networking | πŸ”’ Security | πŸ‘¨πŸ»β€πŸ’» Utility | πŸ“‘ Wireless

(back to top)

Getting Started πŸ—

This is an example of how you may give instructions on setting up your project locally. To get a local copy up and running follow these simple example steps.

Ansible commands instructions (TBA).

(back to top)

Usage

Use this space to show useful examples of how a project can be used. Additional screenshots, code examples and demos work well in this space. You may also link to more resources.

For more examples, please refer to the Documentation

(back to top)

Roadmap 🚸

  • raspi-config (locale, timezone, expand filesystem, etc.)
  • Security hardening (users, SSH w/ key-auth, fail2ban, firewall, etc.)
  • Install all tools mentioned (see previous section)
  • MAC randomization on all interfaces
  • Bluetooth PAN w/ hotspot
  • Auto SSH to domain
  • Self-destruct mechanism

See the open issues for a full list of proposed features (and known issues).

(back to top)

Contributing β™₯️

Contributions are what make the open source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.

If you have a suggestion that would make this better, please fork the repo and create a pull request. You can also simply open an issue with the tag "enhancement". Don't forget to give the project a star! Thanks again!

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

(back to top)

License πŸ“‘

Distributed under the GPLv3 License. See LICENSE for more information.

(back to top)

Contact πŸ“¬

Your Name - @Giovanni_Bacci - github[at]baccichet[dot]org

Project Link: https://github.com/GiovanniBaccichet/dropbox-weaponizer

(back to top)

Acknowledgments πŸ““

(back to top)