samyk / poisontap

Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.

Home Page:https://samy.pl/poisontap/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

USB Device ID customization on Raspbian jessie and up has changed.

dernyn opened this issue · comments

commented

Some changes have been implemented on Raspbian image in jessie 2017 -01 and higher- that is beyond version (2016-05-10), that I believe stops USB gadget device ID customization from working properly with your startup script, the sysfs partition starts a conflicts with your device ID implementation on the startup script due to a system daemon locked file, therefore it uses the native USB gadget mode Hardware/Device ID, instead of the desired File on /sys/kernel/config/usb_gadget/poisontap/UDC which is system locked from userland.