MiniPwner Pentest Drop Box

  

EMAIL ME WHEN AVAILABLE

Add to cart
MiniPwner Pentest Drop Box

*** Have you seen our newest device, the #r00tabaga? It does everything the MiniPwner does, plus quite a bit more. Check it out here. ***

MiniPwner is a "pentest drop box" used to establish rogue access to a target network during a penetration test. 

The Mini Pwner is a small but powerful device that can be inconspicuously plugged into a network and provide the penetration tester remote access to a network.

The MiniPwner is a low-cost, battery-powered alternative to the PlugBot or more powerful Pwn Plug, and is 1/2 the price of our own Pentester's DreamPlug!

MiniPwner features:

  • Integrated Wired and Wireless
    • Once plugged into a target network, the Mini-Pwner can establish an SSH tunnel through the target network, or can be accessed by wifi. In addition, the MiniPwner can be configured as a wifi sniffer and logger - wardriving in your pocket.
  • Low power consumption
    • With the 1700 mAh battery included in the kit, the Mini-Pwner will run for over five hours of active wired and wireless activity. No need to find a power outlet during the pen test.
  • Multiple Pen Testing Tools
    • tcpdump, nmap, kismet, all come pre-installed
  • Flexible and Expandable
    • The MiniPwner runs on the open source OpenWrt operating system. You can easily add or change the installed packages.
  • Small size
    • The MiniPwner can be easily carried in a pocket, hidden behind a telephone, or hang from a jack by a short ethernet cable.

What can you do with it?

Pen Testing Drop Box
In this mode, the MiniPwner used to establish rogue access to a target network during a pentest. The penetration tester uses stealth or social engineering techniques to plug the MiniPwner into an available network port. (common locations include conference rooms, unoccupied workstations, the back of IP Telephones, etc.)

Once it is plugged in, the pentester can log into the MiniPwner and begin scanning and attacking the network. The MiniPwner can simultaneously establish SSH tunnels through the target network, and also allow the pentester to connect to the MiniPwner via Wifi. Many tools can run locally, and more powerful tools such as Metasploit or Nessus can be run through the box using a VPN tunnel.

Wireless war-walking
The battery-powered MiniPwner is small enough to fit in your pants pocket and can run for hours. In wireless war-walking mode you start kismet or aircrack-ng on the MiniPwner and record details about all of the wireless networks detected by the device.

Captive Wifi Portal or Rogue Access Point
Use a tool like Karma to discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames. From there, individual clients can be targetted by creating a Rogue AP for one of their probed networks (which they may join automatically) or using a custom driver that responds to probes and association requests for any SSID. Fake services can then capture credentials or exploit client-side vulnerabilities on the host.

(Looking for the MiniPwner Manual? It's here: minipwner-instructions.pdf)

MiniPwner Pentest Drop Box

Product Images (click to enlarge)
  • MiniPwner Pentest Drop Box
  • MiniPwner Pentest Drop Box
  • MiniPwner Pentest Drop Box

Tags

acess point, ap, battery, drop box, hacker add-on, hacking, micro ap, micro router, mini ap, Mini Broadband Router, mini pwner, mini wireless ap, mintypwner, pen test, pentest, portable, pwn plug, pwnie, pwnplug, router, stealth, tiny, usb, wifi, wireless

MiniPwner Pentest Drop Box

*** Have you seen our newest device, the #r00tabaga? It does everything the MiniPwner does, plus quite a bit more. Check it out here. ***

MiniPwner is a "pentest drop box" used to establish rogue access to a target network during a penetration test. 

The Mini Pwner is a small but powerful device that can be inconspicuously plugged into a network and provide the penetration tester remote access to a network.

The MiniPwner is a low-cost, battery-powered alternative to the PlugBot or more powerful Pwn Plug, and is 1/2 the price of our own Pentester's DreamPlug!

MiniPwner features:

  • Integrated Wired and Wireless
    • Once plugged into a target network, the Mini-Pwner can establish an SSH tunnel through the target network, or can be accessed by wifi. In addition, the MiniPwner can be configured as a wifi sniffer and logger - wardriving in your pocket.
  • Low power consumption
    • With the 1700 mAh battery included in the kit, the Mini-Pwner will run for over five hours of active wired and wireless activity. No need to find a power outlet during the pen test.
  • Multiple Pen Testing Tools
    • tcpdump, nmap, kismet, all come pre-installed
  • Flexible and Expandable
    • The MiniPwner runs on the open source OpenWrt operating system. You can easily add or change the installed packages.
  • Small size
    • The MiniPwner can be easily carried in a pocket, hidden behind a telephone, or hang from a jack by a short ethernet cable.

What can you do with it?

Pen Testing Drop Box
In this mode, the MiniPwner used to establish rogue access to a target network during a pentest. The penetration tester uses stealth or social engineering techniques to plug the MiniPwner into an available network port. (common locations include conference rooms, unoccupied workstations, the back of IP Telephones, etc.)

Once it is plugged in, the pentester can log into the MiniPwner and begin scanning and attacking the network. The MiniPwner can simultaneously establish SSH tunnels through the target network, and also allow the pentester to connect to the MiniPwner via Wifi. Many tools can run locally, and more powerful tools such as Metasploit or Nessus can be run through the box using a VPN tunnel.

Wireless war-walking
The battery-powered MiniPwner is small enough to fit in your pants pocket and can run for hours. In wireless war-walking mode you start kismet or aircrack-ng on the MiniPwner and record details about all of the wireless networks detected by the device.

Captive Wifi Portal or Rogue Access Point
Use a tool like Karma to discover clients and their preferred/trusted networks by passively listening for 802.11 Probe Request frames. From there, individual clients can be targetted by creating a Rogue AP for one of their probed networks (which they may join automatically) or using a custom driver that responds to probes and association requests for any SSID. Fake services can then capture credentials or exploit client-side vulnerabilities on the host.

(Looking for the MiniPwner Manual? It's here: minipwner-instructions.pdf)

$99.00 Out of Stock