Skip to content

Bjorn Cheatsheet

Bjorn Cheatsheet

Overview

Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It is designed to be a portable and easy-to-use tool for security researchers and penetration testers.

Key Features

  • Network Scanning: Scan for nearby wireless networks and clients.
  • Offensive Security: Perform a variety of attacks, such as deauthentication attacks and evil twin attacks.
  • e-Paper Display: The e-Paper display provides a low-power and easy-to-read interface.
  • Open Source: Both the hardware and software are open source.

Getting Started

  1. Hardware: You will need a Raspberry Pi, a 2.13-inch e-Paper HAT, and a few other components.
  2. Software: You will need to install the Bjorn software on your Raspberry Pi.
  3. Assembly: Assemble the hardware according to the instructions.
  4. Power On: Power on the Bjorn and you are ready to start hacking.

Common Attacks

  • WiFi Deauthentication: Use the deauthentication attack to disconnect clients from their wireless networks.
  • Evil Twin: Create an evil twin access point to intercept traffic from unsuspecting users.

Defensive Measures

  • Use a VPN: A VPN will encrypt your traffic, even if you are connected to a rogue access point.
  • Disable Auto-Connect: Disable the auto-connect feature on your devices to prevent them from automatically connecting to unknown wireless networks.
  • Be Wary of Open Networks: Be suspicious of open wireless networks, especially in public places.
  • Use a Firewall: A firewall can help to protect your device from attacks, even if you are connected to a malicious network.

Additional Resources