An analogue of Flipper Zero called Pwnagotchi based on Raspberry Pi was released

Short description

Summarize this content to 100 words The Pwnagotchi project has been published to research wireless networks based on the Wi-Fi standard. It is an enthusiast-supported Raspberry Pi-based counterpart to Flipper Zero.Pwnagotchi uses a Raspberry Pi Zero W and custom software that allows the device to automatically scan and analyze nearby wireless Wi-Fi networks.The tool allows you to collect information about surrounding Wi-Fi networks and clients connected to them, as well as WPA/WPA-2 authentication packets in a completely offline mode.After downloading, Pwnagotchi goes into monitoring mode, scans the airwaves, and when the client connects to the access point, intercepts and saves a file with authentication packets on a microSD card. When a client-point pair is detected, it applies a deauthentication attack followed by interception of the handshake at the moment the client reconnects.The device can be preconfigured to send handshakes to special services, for example, wpa-sec.stanev.org or onlinehashcrack.com to attack by dictionary, search or display a password that is already in the service database. Pwnagotchi is trainable as its built-in neural network allows it to adapt to different networks and conditions, optimizing attack strategies and attack speed. The Pwnagotchi screen with e-ink technology consumes little energy and displays information without backlighting. You can also use LCD or OLED screens or abandon them and transfer visual information to a smartphone via a web interface.The device is equipped with a lithium-ion battery, like the PiSugar, and can be powered by a power bank or any 5-volt USB port.Pwnagotchi uses a wireless adapter that should support monitoring. Raspberry Pi Zero W has built-in Wi-Fi, you can also connect external Wi-Fi adapters with another single-board computer from the manufacturer.The Pwnagotchi case can be printed on a 3D printer or bought ready-made. The GPS receiver can be connected via a MicroUsb port or via a special expansion card.The real-time clock RTC module with a small battery can be used to save the time and date settings even when the main power of the device is turned off or when the main battery is discharged.Pwnagotchi runs on Pwnagotchi OS. It is based on the Raspbian operating system (Raspberry Pi OS) on the Linux kernel. Pwnagotchi OS includes tools for intercepting, analyzing and processing wireless packets.Pwnagotchi also offers a web interface to configure and manage the device. In it, you can view statistics, logs, and attack results.There are also plugins for Pwnagotchi, including bt-tether for connecting to a smartphone via Bluetooth, gps for saving GPS coordinates, memtemp for determining memory and temperature, and others.To assemble Pwnagotchi, you need to find a list of components and instructions on the official project website and in the community of device owners.After assembly, you need to download the Pwnagotchi OS image from the network and burn it to a microSD card, then insert it into the Raspberry Pi Zero W.When launched, Pwnagotchi generates SSH keys and starts scanning wireless networks. At the same time, accompanying information and an animated face of the virtual pet will be displayed on the device screen.To transfer this data to your device, you need to connect to the Raspberry Pi via SSH, via a USB interface, or with a keyboard and monitor, via special adapters. You can also set up a Bluetooth connection through the bluetoothctl utility to connect to a smartphone.Then you need to configure the configuration file: config.toml. It stores various information about the device, such as the pet’s name, display type, set of plugins, and authentication tokens for communication with external services.Use of Pwnagotchi is considered legal for the purpose of testing the security of your own wireless network or with the permission of the network owner. In many countries, it is not illegal to collect client and Wi-Fi access point authentication packets.Meanwhile, Flipper Zero has an expansion store. In 2022, the company managed to sell $25 million worth of devices.

An analogue of Flipper Zero called Pwnagotchi based on Raspberry Pi was released

The Pwnagotchi project has been published to research wireless networks based on the Wi-Fi standard. It is an enthusiast-supported Raspberry Pi-based counterpart to Flipper Zero.

Pwnagotchi uses a Raspberry Pi Zero W and custom software that allows the device to automatically scan and analyze nearby wireless Wi-Fi networks.

The tool allows you to collect information about surrounding Wi-Fi networks and clients connected to them, as well as WPA/WPA-2 authentication packets in a completely offline mode.

After downloading, Pwnagotchi goes into monitoring mode, scans the airwaves, and when the client connects to the access point, intercepts and saves a file with authentication packets on a microSD card. When a client-point pair is detected, it applies a deauthentication attack followed by interception of the handshake at the moment the client reconnects.

The device can be preconfigured to send handshakes to special services, for example, wpa-sec.stanev.org or onlinehashcrack.com to attack by dictionary, search or display a password that is already in the service database.

Pwnagotchi is trainable as its built-in neural network allows it to adapt to different networks and conditions, optimizing attack strategies and attack speed.

The Pwnagotchi screen with e-ink technology consumes little energy and displays information without backlighting. You can also use LCD or OLED screens or abandon them and transfer visual information to a smartphone via a web interface.

The device is equipped with a lithium-ion battery, like the PiSugar, and can be powered by a power bank or any 5-volt USB port.

Pwnagotchi uses a wireless adapter that should support monitoring. Raspberry Pi Zero W has built-in Wi-Fi, you can also connect external Wi-Fi adapters with another single-board computer from the manufacturer.

The Pwnagotchi case can be printed on a 3D printer or bought ready-made.

The GPS receiver can be connected via a MicroUsb port or via a special expansion card.

The real-time clock RTC module with a small battery can be used to save the time and date settings even when the main power of the device is turned off or when the main battery is discharged.

Pwnagotchi runs on Pwnagotchi OS. It is based on the Raspbian operating system (Raspberry Pi OS) on the Linux kernel. Pwnagotchi OS includes tools for intercepting, analyzing and processing wireless packets.

Pwnagotchi also offers a web interface to configure and manage the device. In it, you can view statistics, logs, and attack results.

There are also plugins for Pwnagotchi, including bt-tether for connecting to a smartphone via Bluetooth, gps for saving GPS coordinates, memtemp for determining memory and temperature, and others.

To assemble Pwnagotchi, you need to find a list of components and instructions on the official project website and in the community of device owners.

After assembly, you need to download the Pwnagotchi OS image from the network and burn it to a microSD card, then insert it into the Raspberry Pi Zero W.

When launched, Pwnagotchi generates SSH keys and starts scanning wireless networks. At the same time, accompanying information and an animated face of the virtual pet will be displayed on the device screen.

To transfer this data to your device, you need to connect to the Raspberry Pi via SSH, via a USB interface, or with a keyboard and monitor, via special adapters. You can also set up a Bluetooth connection through the bluetoothctl utility to connect to a smartphone.

Then you need to configure the configuration file: config.toml. It stores various information about the device, such as the pet’s name, display type, set of plugins, and authentication tokens for communication with external services.

Use of Pwnagotchi is considered legal for the purpose of testing the security of your own wireless network or with the permission of the network owner. In many countries, it is not illegal to collect client and Wi-Fi access point authentication packets.

Meanwhile, Flipper Zero has an expansion store. In 2022, the company managed to sell $25 million worth of devices.

Related posts