WarBerryPi - Turn your Raspberry Pi into a War Machine

The WarBerry was built with one goal in mind; to be used in red teaming engagement where we want to obtain as much information as possible in a short period of time with being as stealth as possible. Just find a network port and plug it in. The scripts have been designed in a way that the approach is targeted to avoid noise in the network that could lead to detection and to be as efficient as possible. The WarBerry script is a collection of scanning tools put together to provide that functionality.

To get a list of all options and switches use:

sudo python warberry.py -h

-h, --help [*] Print this help banner
-m, --man [*] Prints WarBerry's Man Page
-A, --attack [*] Run All Enumeration Scripts
-S, --sniffer [*] Run Sniffing Modules Only
-C, --clear [*] Clear Output Directories
-F, --fulltcp [*] Full TCP Port Scan
-T, --toptcp [*] Top Port Scan
-U, --topudp [*] Top UDP Port Scan

example usage: sudo python warberry.py -A
sudo python warberry.py --attack
sudo python warberry.py -C

Optional: Change the hostname of the RaspberryPi to WarBerry
sudo nano /etc/hosts
sudo nano /etc/hostname
Reboot the WarBerry for the changes to take effect
Create a directory under /home/pi
sudo mkdir WarBerry
Create the Results subdirectory in /WarBerry
sudo mkdir Results
Download WarBerry by cloning the Git repository:
sudo git clone https://github.com/secgroundzero/warberry.git

The tool in case of MAC address filtering enumerates by default the subnets specified under /home/pi/WarBerry/warberry/discover . This is done for the tool to run quicker. If you want to enumerate more subnets either add the subnets in that file or change line 154 in rest_bypass.py so that it does not read from the file.

  • sudo apt-get install nbtscan
  • sudo apt-get install python-scapy
  • sudo apt-get install tcpdump
  • sudo apt-get install nmap
  • sudo pip install python-nmap
  • sudo pip install ipaddress
  • sudo apt-get install ppp
  • sudo apt-get install sg3-utils
  • sudo apt-get install netdiscover
  • sudo apt-get install macchanger
  • sudo git clone https://github.com/DanMcInerney/net-creds.git #install in /home/pi/WarBerry/Tools/

Extra Tools for Post Exploitation. Best to install in /home/pi/WarBerry/Tools/ directory

Aircrack Installation


Running the tool with a switch

Connect to GND and port 23 pins on the RPi.

Script for autorunning with a switch

#!/usr/bin/env python2.7
import RPi.GPIO as GPIO
import subprocess

# GPIO 23 set up as input. It is pulled up to stop false signals
GPIO.setup(23, GPIO.IN, pull_up_down=GPIO.PUD_UP)

print "it will connect GPIO port 23 (pin 16) to GND (pin 6)\n"

print "Waiting for falling edge on port 23"

GPIO.wait_for_edge(23, GPIO.FALLING)
subprocess.call(["python /home/pi/WarBerry/warberry/warberry.py -A"])

except KeyboardInterrupt:
GPIO.cleanup() # clean up GPIO on CTRL+C exit
GPIO.cleanup() # clean up GPIO on normal exit

Disqus Comments