Merge branch 'main' into ranlo-patch-1
This commit is contained in:
commit
c7b54a50e1
@ -8,11 +8,11 @@ TinyCheck allows you to easily capture network communications from a smartphone
|
||||
|
||||
The idea of TinyCheck emerged in a meeting about stalkerware with a [French women's shelter](https://www.centre-hubertine-auclert.fr). During this meeting we talked about how to easily detect [stalkerware](https://stopstalkerware.org/) without installing very technical apps nor doing forensic analysis on the victim's smartphone. The initial concept was to develop a tiny kiosk device based on Raspberry Pi which can be used by non-tech people to test their smartphones against malicious communications issued by stalkerware or any spyware.
|
||||
|
||||
Of course, TinyCheck can also be used to spot any malicious communications from cybercrime to state-sponsored implants. It allows the end-user to push his own extended Indicators of Compromise via a backend in order to detect some ghosts over the wire.
|
||||
Of course, TinyCheck can also be used to spot any malicious communications from cybercrime to state-sponsored implants. It allows the end-user to push their own extended Indicators of Compromise via a backend in order to detect some ghosts over the wire.
|
||||
|
||||
<p align="center"><strong>If you need more documentation on how to install it, use it and the internals, don't hesitate to take a look at the <a href="https://github.com/KasperskyLab/TinyCheck/wiki">TinyCheck Wiki</a>.</strong></p>
|
||||
|
||||
<p align="center">If you have any question about the projet, want to contribute or just send your feedback, <br />don't hesitate to contact us at tinycheck[@]kaspersky[.]com.</p>
|
||||
<p align="center">If you have any question about the project, want to contribute or just send your feedback, <br />don't hesitate to contact us at tinycheck[@]kaspersky[.]com.</p>
|
||||
|
||||
### Use cases
|
||||
|
||||
|
2
app/backend/package-lock.json
generated
2
app/backend/package-lock.json
generated
@ -1,5 +1,5 @@
|
||||
{
|
||||
"name": "tinycheck-backend",
|
||||
"name": "@kaspersky/tinycheck-backend",
|
||||
"version": "0.1.0",
|
||||
"lockfileVersion": 1,
|
||||
"requires": true,
|
||||
|
@ -1,7 +1,6 @@
|
||||
{
|
||||
"name": "tinycheck-backend",
|
||||
"name": "@kaspersky/tinycheck-backend",
|
||||
"version": "0.1.0",
|
||||
"private": true,
|
||||
"scripts": {
|
||||
"serve": "vue-cli-service serve --copy --port=4201",
|
||||
"build": "vue-cli-service build",
|
||||
|
2
app/frontend/package-lock.json
generated
2
app/frontend/package-lock.json
generated
@ -1,5 +1,5 @@
|
||||
{
|
||||
"name": "tinycheck-new",
|
||||
"name": "@kaspersky/tinycheck-new",
|
||||
"version": "0.1.0",
|
||||
"lockfileVersion": 1,
|
||||
"requires": true,
|
||||
|
@ -1,7 +1,6 @@
|
||||
{
|
||||
"name": "tinycheck-new",
|
||||
"name": "@kaspersky/tinycheck-new",
|
||||
"version": "0.1.0",
|
||||
"private": true,
|
||||
"scripts": {
|
||||
"serve": "vue-cli-service serve --copy --port=4202",
|
||||
"build": "vue-cli-service build",
|
||||
|
@ -16,3 +16,4 @@ qrcode
|
||||
netifaces
|
||||
weasyprint
|
||||
python-whois
|
||||
six
|
||||
|
@ -53,7 +53,7 @@ frontend:
|
||||
update: updateoption
|
||||
choose_net: false
|
||||
http_port: 80
|
||||
|
||||
|
||||
# NETWORK -
|
||||
# Some elements related to the network configuration, such as
|
||||
# the interfaces (updated during the install), the list of SSIDs
|
||||
@ -78,6 +78,6 @@ network:
|
||||
watchers:
|
||||
iocs:
|
||||
- https://raw.githubusercontent.com/KasperskyLab/TinyCheck/main/assets/iocs.json
|
||||
- https://raw.githubusercontent.com/Te-k/stalkerware-indicators/master/indicators-for-tinycheck.json
|
||||
- https://raw.githubusercontent.com/Te-k/stalkerware-indicators/master/generated/indicators-for-tinycheck.json
|
||||
whitelists:
|
||||
- https://raw.githubusercontent.com/KasperskyLab/TinyCheck/main/assets/whitelist.json
|
||||
|
@ -396,7 +396,7 @@ check_interfaces(){
|
||||
# Wi-Fi interface with AP mode available.
|
||||
for iface in $IFACES;
|
||||
do
|
||||
if echo "$iface" | grep -Eq "(wlan[0-9]|wl[a-z0-9]{20})"; then
|
||||
if echo "$iface" | grep -Eq "(wlan[0-9]|wl[a-z0-9]{2,20})"; then
|
||||
config="$(ifconfig $iface)" # Get the iface logic configuration
|
||||
if echo "$config" | grep -qv "inet "; then # Test if not currently connected
|
||||
hw="$(iw $iface info | grep wiphy | cut -d" " -f2)" # Get the iface hardware id.
|
||||
|
Loading…
Reference in New Issue
Block a user