• Home
  • Blog
  • About Us
  • Index
Menu

#_shellntel

Street Address
City, State, Zip
Phone Number
A SynerComm Team

Your Custom Text Here

#_shellntel

  • Home
  • Blog
  • About Us
  • Index

Building a Pwnagotchi

May 15, 2020 Ryan Zagrodnik
IMG_20200303_230312_2.jpg

What is a Pwnagotchi?

From the Website:

Pwnagotchi is an A2C-based “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures (either through passive sniffing or by performing deauthentication and association attacks). This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs.

Sound Familiar?

In case you're curious about the name: Pwnagotchi (ポーナゴッチ) is a portmanteau of pwn and -gotchi. It is a nostalgic reference made in homage to a very popular children's toy from the 1990s called the Tamagotchi. The Tamagotchi (たまごっち, derived from tamago (たまご) "egg" + uotchi (ウオッチ) "watch") is a cultural touchstone for many Millennial hackers as a formative electronic toy from our collective childhoods.


Legal

  • I am not an attorney.

  • Attacking wireless devices without permission is likely a violation of the Computer Fraud and Abuse Act (CFAA).

  • Each state and country has their own laws pertaining to the unauthorized access and collection of data.


Cost

  • Completed Build - $92.96

  • Minimum Build - $26.48

    • Pi Zero With Headers - $14

    • 32GB MicroSD - $7.49

    • USB 2.0 A-Male to Micro B Cable - $4.99

  • Extras - $66.48

    • Waveshare 2.13 inch e-Paper Display Hat 250x122 - $25.99

    • Battery - $38.99

    • Case - $1.50

Notes

  • No soldering required if you buy the Raspberry Pi Zero with the preinstalled headers.

  • Cases can be printed, the one used in this build: (https://www.thingiverse.com/thing:3920904).


Unboxing

IMG_3719.JPG
IMG_3720.JPG

Side A

IMG_3724.JPG

Side B

IMG_3722.JPG

Flashing an Image (https://pwnagotchi.ai/installation)

Flashing an Image

The easiest way to create a new Pwnagotchi is downloading the latest stable image from our release page and writing it to your SD card.

Download the latest Pwnagotchi release

Once you have downloaded the latest Pwnagotchi image, you will need to use an image writing tool to install that image on your SD card. We recommend using balenaEtcher, a graphical SD card writing tool that works on Mac OS, Linux, and Windows; it is the easiest option for most users. (balenaEtcher also supports writing images directly from the ZIP file, without any unzipping required!)

To write your Pwnagotchi image with balenaEtcher:

- Download the latest Pwnagotchi .img file.

- Verify the SHA-256 checksum of the .img

- Download balenaEtcher and install it.

- Connect an SD card reader with the SD card inside.

- Open balenaEtcher and select from your hard drive the Raspberry Pi .img or .zip file you wish to write to the SD card.

- Select the SD card you wish to write your image to.

- Review your selections, then click Flash! to begin writing data to the SD card.

Connect Your USB Micro to the Data Port and Wait for the Pwnagotchi to Boot

Picture1.png

Configure Your Newly Found Ethernet Adapter

b.PNG

Connect to the Terminal via Putty

c.PNG

Words of Caution

  • Pwngrid is enabled by default (Pwngrid is a cloud database controlled by ¯\_(ツ)_/¯)

  • Whitelist networks, like your own, before connecting it to the internet

  • Whitelisting alone will not prevent the handshake from being passively captured

  • YML is very picky about syntax

  • YML errors will cause screen not to function even when the logs look fine


Example Config

Edit the config located in /etc/pwnagotchi/config.yml, restart, and you should be good-to-go.

# Add your configuration overrides on this file any configuration changes done to default.yml will be lost!
# Example:
#
# ui:
#   display:
#     type: 'inkyphat'
#     color: 'black'
#

main:
  name: '<NAMEOFPWNAGOTCHI>'
  whitelist:
    - '<YOURNETWORK>'
  plugins:
    grid:
      enabled: false
      report: false
      exclude:
        - '<YOURNETWORK>'
ui:
    display:
      enabled: true
      type: 'waveshare_2'
      color: 'black'
    web:
        username: pi
        password: <YOURPASSWORD>

Anatomy of a Pwnagotchi Screen (https://pwnagotchi.ai/usage)

c7xh4hN.png

Completed Build

IMG_0187.jpg
IMG_20200228_075523_3.jpg
2020-03-03_11-08-25-3.png

References

  • https://pwnagotchi.ai

  • https://www.reddit.com/r/pwnagotchi

  • https://github.com/evilsocket/pwnagotchi

  • https://community.pwnagotchi.ai

  • Pwnagotchi Slack

  • Fatmann66's YouTube Channel


- @TheL0singEdge

Tags pwnagotchi, wireless, hacking, penetration testing, information security, network security
Comment
Latest Blog Posts
Modern Attack Surface.png
Dec 23, 2020
In Scope or Out of Scope?
Dec 23, 2020
Dec 23, 2020
Building a Pwnagotchi
May 15, 2020
Building a Pwnagotchi
May 15, 2020
May 15, 2020
AWS Metadata Endpoint - How to not get pwned like Capital One
Aug 27, 2019
AWS Metadata Endpoint - How to not get pwned like Capital One
Aug 27, 2019
Aug 27, 2019
How to build a (2nd) 8 GPU password cracker
Feb 20, 2019
How to build a (2nd) 8 GPU password cracker
Feb 20, 2019
Feb 20, 2019
DA 101 - Protecting your Domain Admin Account
Oct 22, 2018
DA 101 - Protecting your Domain Admin Account
Oct 22, 2018
Oct 22, 2018
OpenSSH < 7.7 - Username Enumeration Exploit
Aug 21, 2018
OpenSSH < 7.7 - Username Enumeration Exploit
Aug 21, 2018

On August 15th, 2018 a vulnerability was posted on the OSS-Security list. This post explained that OpenSSH (all versions prior to and including 7.7) is vulnerable to username enumeration by sending a malformed public key authentication request (SSH2_MSG_USERAUTH_REQUEST with type publickey) to the service.

Aug 21, 2018
Mar 17, 2017
Thoughts on Blocking Powershell.exe
Mar 17, 2017
Mar 17, 2017
How to build a 8 GPU password cracker
Feb 13, 2017
How to build a 8 GPU password cracker
Feb 13, 2017
Feb 13, 2017
The Upside Down - Ventures into the 5GHZ Spectrum
Oct 26, 2016
The Upside Down - Ventures into the 5GHZ Spectrum
Oct 26, 2016
Oct 26, 2016
Oct 6, 2016
spin-up: Quickly Launch a Provisioned EC2 Attack Server
Oct 6, 2016
Oct 6, 2016
Sep 23, 2016
Luckystrike: An Evil Office Document Generator.
Sep 23, 2016
Sep 23, 2016
The Number One Pentesting Tool You're Not Using
Aug 3, 2016
The Number One Pentesting Tool You're Not Using
Aug 3, 2016
Aug 3, 2016
Screen Shot 2016-07-08 at 10.22.17 AM.png
Jul 8, 2016
Invoke-SMBAutoBrute.ps1 - Smart SMB Brute Forcing
Jul 8, 2016
Jul 8, 2016
Screen Shot 2016-06-07 at 4.13.13 PM.png
Jun 8, 2016
Weaponizing Nessus
Jun 8, 2016
Jun 8, 2016
May 24, 2016
Update to ProxyCannon
May 24, 2016
May 24, 2016
May 12, 2016
VPN over DNS
May 12, 2016
May 12, 2016
Feb 22, 2016
Websocket based egress buster
Feb 22, 2016
Feb 22, 2016
Feb 18, 2016
Abusing Exchange Web Service - Part 1
Feb 18, 2016
Feb 18, 2016
Screen Shot 2016-02-04 at 2.36.33 PM.png
Feb 8, 2016
Why Security Awareness Training Fails
Feb 8, 2016
Feb 8, 2016
Oct 6, 2015
Assisted directory brute forcing
Oct 6, 2015
Oct 6, 2015
crEAP - Harvesting Users on Enterprise Wireless Networks
Oct 1, 2015
crEAP - Harvesting Users on Enterprise Wireless Networks
Oct 1, 2015
Oct 1, 2015
Sep 26, 2015
[UPDATE] Creating your own private botnet for scanning.
Sep 26, 2015
Sep 26, 2015
Sep 25, 2015
Drone Code Execution (Part 1)
Sep 25, 2015
Sep 25, 2015
PowerShell Memory Scraping for Credit Cards
Sep 18, 2015
PowerShell Memory Scraping for Credit Cards
Sep 18, 2015
Sep 18, 2015
Sep 9, 2015
Intro To Active Directory Delegation
Sep 9, 2015
Sep 9, 2015
Jul 27, 2015
Using PowerShell & Unicorn to Get Persistence
Jul 27, 2015
Jul 27, 2015
screenshot.png
Jul 14, 2015
Creating your own private botnet for scanning.
Jul 14, 2015
Jul 14, 2015
Jun 18, 2015
Circle City Con: 2015 CTF Writeup
Jun 18, 2015
Jun 18, 2015
Qualys Scanner API In Powershell Including External Ticket Creation
Jun 12, 2015
Qualys Scanner API In Powershell Including External Ticket Creation
Jun 12, 2015
Jun 12, 2015
Jun 12, 2015
Validating the Effectiveness of Your Controls
Jun 12, 2015
Jun 12, 2015

Shellntel™ - Brought to you by SynerComm