-
Notifications
You must be signed in to change notification settings - Fork 29
Features (EN)
The functionalities can be broken down into three broad categories:
These features give you turnkey solutions to understand hacking, its dangers and protect yourself.
Other functionalities are at your disposal. Feel free to submit yours.
-
The key cloner tool supplied with Bramble allows you to copy the contents of a USB storage device by directly fetching any type of file (PDF, images, word, powerpoint). This Tool becomes impressive coupled with the portability of Bramble. You will quickly understand the importance of not leaving your USB keys anywhere.
-
In the forensic section there is a feature to recover deleted files on external storage devices (USB key, external hard disk). You will be aware of all the sensitive data that you think has been deleted but is still accessible. As for the key cloner, the tool allows to select the type(s) of file to recover.
If we have noticed potential risks for our data above there are some efficient ways to protect yourself.
-
A tool to encrypt your files is provided. So if an ill-intentioned person gets hold of them, he won't be able to exploit them.
-
However, you have understood that with yes / no / stop buttons it is not easy to have a strong password. And the vulnerability of an encrypted file is often the weakness of the password. That's why, there is a feature that allows you to generate a unique password from a file (your best selfie for example). This selfie would then become your key to decrypt your files or to generate a complex password to replace your old passwords online.
-
Another protection, the steganography. The art of hiding a file in an image without effect on the quality of the image. Completely invisible, this tool is extremely effective in protecting your data. Indeed, it becomes impossible for a normal user to discover your hidden files and this makes the task difficult for a potential hacker.
Different types of network attacks exist. The main ones used here are sniffing, DOS (Denial of Service) and phishing. Be careful, to stay within the law you must use these tools only on your network and your own machines. Otherwise, we are not responsible for your use of BrambleS.
-
You want to know which sites are visited by the devices connected to the network, because for example you care about what your children are doing on the net. Bramble allows you to collect this type of information without having to manipulate your child's PC, so your child won't be able to suspect it.
-
However the previous type of attack can be detected by a competent network administrator... Or by a Bramble user who launched the detection tool included in BrambleS.
-
Bramble uses two types of wifi jamming. The first will allow you to jam a wifi network without having to be connected. However, to use it you will need an additional network card supporting the injection. The second type of wifi jamming will not require an additional network card but it need to be connected to the target network. In both cases you can target a particular user (convenient for blocking your child's computer after midnight for example) or the entire network. In reality this tool does not physically jam the network (strictly prohibited in most countries) the first Bramble attack loops to disconnect computers from the target network and the second attack simply blocks network traffic.
-
Bramble is not powerful enough to crack wifi by bruteforce. Moreover this type of attack be endless if it is poorly prepared. That's why we chose to use an attack to trap the box owner. For this attack you will need an additional network card compatible with packet injection. The concept is simple. We're blocking access to the access point. We create a second access point with the same name as the box. The user who no longer has Internet access will connect to our access point. An "official" page of the box will open asking for the wpa key for security reasons. The user inserts the key and you have the key to connect to his box. This tool is a version of Fluxion adapted for Bramble.
BrambleS provides other small tools that you can use. In particular, a network scanner to know who is connected to your network and thus be able to detect possible intruders, but also a bruteforce ssh (I invite you to read the first paragraph of this site about bruteforce ssh) which will try all the known default passwords and the most used passwords.
Bramble can be remotely controlled by a computer (currently connected to the same network) and use all BrambleS features from this PC.
Like Bramble is based on a raspberry pi we have given you access to the whole linux environment. So you can use Bramble as a mini computer (web, open office...).
Left-handed? we thought of you it is possible to switch the buttons to the left . Moreover it is possible to connect your Bramble on an HDMI screen.
Finally if you are afraid of being overwhelmed by all these features, stay cool, we haven't forgotten you. It is possible to switch to a lighten menu and you will only be presented with the most basic features.
If you have new feature ideas try to develop them by yourself it will make you progress considerably. You will then be able to share them to help others to progress. I invite you to look at the section to this effect if you are interested.
Feel free to contact me if you have any ideas or constructive comments about BrambleS.