Skip to content

Conversation

joelsernamoreno
Copy link

Added FingerprintUSBHost library.

New command "GetOS:"

When you execute the command "GetOS:" in the textarea or in a payload, the file OS.txt will appear in the Exfiltrate section.

Inside that file you will find the operating system of the computer where the ESPloitV2 device is connected.

Tested with WHID Injector on Linux and Windows.

@joelsernamoreno joelsernamoreno changed the title FingerprintUSBHost implementation to detect SO FingerprintUSBHost implementation to detect OS Aug 4, 2019
@whid-injector
Copy link

This is a local fork of ESPloitV2 since there are some PR unapproved on exploitagency/ESPloitV2 that I would like to see merged.
If you have PRs and don't get approved on Corey's repo, do make them here: https://github.com/whid-injector/WHID/tree/master/ESPloitV2_whid
Thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants