Evil SSDP

This tool responds to SSDP multicast discover requests, posing as a generic UPNP device on a local network. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable webpage.

Requirement:

Attacker on the same network could spoof Printer

└─$ evil-ssdp eth0 --template scanner

On User network, there is a printer is waiting

If you user open, it will request for credentials

Attacker will obtained cleartext credential

Last updated