Skip to content

Commit

Permalink
Adapt to new baseURL
Browse files Browse the repository at this point in the history
  • Loading branch information
andreock committed Mar 10, 2024
1 parent 1c974bb commit e9167eb
Show file tree
Hide file tree
Showing 11 changed files with 41 additions and 13 deletions.
2 changes: 1 addition & 1 deletion docs/badusb/run_payload.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ Actually file browser not support scrolling so you can upload 4-5 files max.

Once you click OK button on selected payload it will be executed and GUI will be blocked until finish(we will add stop feature soon).

<img src="/img/screens/badusb/badusb_file_explorer.png" />
<img src="/docs/img/screens/badusb/badusb_file_explorer.png" />
26 changes: 26 additions & 0 deletions docs/bluetooth/hid_attack.WIP
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
sidebar_position: 4
title: HID Attack
---

Usually you perform an HID attack using a USB interface but capibaraZero have support also BLE HID.

In this way a device can connect to capibaraZero and it will act like a HID interface.

capibaraZero HID doesn't have any type on bluetooth PIN, so as soon as a device connects, capibaraZero will start to execute the ducky script.

## Configuration

In the capibaraZero JSON configuration you can set BLE device name, HID manufacturer and battery level.

By default the following are used:

- Device name: capibaraZero HID
- HID manufacturer: capibaraZero
- Battery level: 100

### Run attack

- Go in the bluetooth attack section
- Select HID attack
- Connect to capibaraZero and see the ducky script running
2 changes: 1 addition & 1 deletion docs/network_attacks/dhcp_starvation.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,4 +30,4 @@ Smaller are the subnet, less time CapibaraZero needs to finish DHCP pool.

### GUI screenshot

<img src="/img/screens/network_attacks/dhcp_glutton.png" alt="DHCPGlutton screnshot" />
<img src="/docs/img/screens/network_attacks/dhcp_glutton.png" alt="DHCPGlutton screnshot" />
2 changes: 1 addition & 1 deletion docs/network_attacks/evilportal.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,4 +23,4 @@ CapibaraZero captive portal act like a web server so you can upload CSS, JS or o

### GUI

<img src="/img/screens/network_attacks/evilportal.png" alt="EvilPortal GUI screenshot" />
<img src="/docs/img/screens/network_attacks/evilportal.png" alt="EvilPortal GUI screenshot" />
2 changes: 1 addition & 1 deletion docs/nfc/bruteforce_tag.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,4 @@ With capibaraZero you will be able to bruteforce MIFARE classic tags and find ke
- Wait until PN532 try keys for all sectors
- Check on the screen if capibaraZero have found the key

<img src="/img/screens/nfc/bruteforce_tag.png"/>
<img src="/docs/img/screens/nfc/bruteforce_tag.png"/>
2 changes: 1 addition & 1 deletion docs/nfc/dump_tag_sd.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,4 @@ title: Dump a card in the SD
- Wait until PN532 dump all sectors and view results on the screen
- You have 10 seconds to save dump by clicking OK button, after that, main GUI will be shown

<img src="/img/screens/nfc/dump_tag.png"/>
<img src="/docs/img/screens/nfc/dump_tag.png"/>
2 changes: 1 addition & 1 deletion docs/schematics/circuit.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ title: The circuit

Here you can find breadboard scheme of CapibaraZero:

![breaboard_circuit](/img/scheme/board_bb.png)
<img src="/docs/img/scheme/board_bb.png" />

## ESP32-S3 pinout

Expand Down
6 changes: 3 additions & 3 deletions docs/wifi/scan_wifi.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,6 @@ The WiFi scanning scan the enviroments to search AP and store SSID, BSSID, RSSI,

Scanning GUI:

![WiFi scanning page](/img/screens/wifi_scanning.png)
![WiFi network detail page](/img/screens/wifi/wifi_details.png)
![WiFi network save page](/img/screens/wifi/wifi_network_save.png)
<img src="/docs/img/screens/wifi_scanning.png" />
<img src="/docs/img/screens/wifi/wifi_details.png" />
<img src="/docs/img/screens/wifi/wifi_network_save.png" />
4 changes: 3 additions & 1 deletion docs/wifi/wifi_sniffer.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,6 @@ You can also apply some filter for packets. This attack can sniff EAPOL key, PMK
- Select Sniffer and CapibaraZero will start the sniff
- To stop press save with OK button

![WiFi sniff page](/img/screens/wifi/wifi_sniff.png)
<!-- ![WiFi sniff page]() -->

<img src="/docs/img/screens/wifi/wifi_sniff.png" />
4 changes: 2 additions & 2 deletions docusaurus.config.ts
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ const config: Config = {
favicon: 'img/favicon.ico',

// Set the production url of your site here
url: 'https://your-docusaurus-site.example.com',
url: 'https://capibarazero.github.io/',
// Set the /<baseUrl>/ pathname under which your site is served
// For GitHub pages deployment, it is often '/<projectName>/'
baseUrl: '/docs/',
Expand All @@ -18,7 +18,7 @@ const config: Config = {
organizationName: 'CapibaraZero', // Usually your GitHub org/user name.
projectName: 'docs', // Usually your repo name.

onBrokenLinks: 'throw',
onBrokenLinks: 'warn',
onBrokenMarkdownLinks: 'warn',

// Even if you don't use internationalization, you can use this field to set
Expand Down
2 changes: 1 addition & 1 deletion src/pages/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ title: CapibaraZero docs
<h1>CapibaraZero</h1>
<h3>A cheap alternative to FlipperZero™ based on Espressif boards</h3>
<div class="grid-2">
<a href="/docs/intro/" class="button-1">
<a href="docs/intro/" class="button-1">
Read the docs
</a>
<a class="button-1">
Expand Down

0 comments on commit e9167eb

Please sign in to comment.