Bjorn Cheatsheet
Bjorn Cheatsheet¶
Overview¶
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It is designed to be a portable and easy-to-use tool for security researchers and penetration testers.
Key Features¶
- Network Scanning: Scan for nearby wireless networks and clients.
- Offensive Security: Perform a variety of attacks, such as deauthentication attacks and evil twin attacks.
- e-Paper Display: The e-Paper display provides a low-power and easy-to-read interface.
- Open Source: Both the hardware and software are open source.
Getting Started¶
- Hardware: You will need a Raspberry Pi, a 2.13-inch e-Paper HAT, and a few other components.
- Software: You will need to install the Bjorn software on your Raspberry Pi.
- Assembly: Assemble the hardware according to the instructions.
- Power On: Power on the Bjorn and you are ready to start hacking.
Common Attacks¶
- WiFi Deauthentication: Use the deauthentication attack to disconnect clients from their wireless networks.
- Evil Twin: Create an evil twin access point to intercept traffic from unsuspecting users.
Defensive Measures¶
- Use a VPN: A VPN will encrypt your traffic, even if you are connected to a rogue access point.
- Disable Auto-Connect: Disable the auto-connect feature on your devices to prevent them from automatically connecting to unknown wireless networks.
- Be Wary of Open Networks: Be suspicious of open wireless networks, especially in public places.
- Use a Firewall: A firewall can help to protect your device from attacks, even if you are connected to a malicious network.