From 14fec393716bd2954ee021013ef3f0962992b19f Mon Sep 17 00:00:00 2001 From: ghartmann <45218534+g-hartmann@users.noreply.github.com> Date: Tue, 31 Aug 2021 13:36:19 +0200 Subject: [PATCH 1/6] Fixes #10 --- install.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/install.sh b/install.sh index d76474f..f3f8bc7 100644 --- a/install.sh +++ b/install.sh @@ -396,7 +396,7 @@ check_interfaces(){ # Wi-Fi interface with AP mode available. for iface in $IFACES; do - if echo "$iface" | grep -Eq "(wlan[0-9]|wl[a-z0-9]{20})"; then + if echo "$iface" | grep -Eq "(wlan[0-9]|wl[a-z0-9]{2,20})"; then config="$(ifconfig $iface)" # Get the iface logic configuration if echo "$config" | grep -qv "inet "; then # Test if not currently connected hw="$(iw $iface info | grep wiphy | cut -d" " -f2)" # Get the iface hardware id. From 1c381f5b392f41f2912b47a7e02a8f2dd45cdcfc Mon Sep 17 00:00:00 2001 From: chebatory Date: Tue, 26 Oct 2021 06:34:27 -0400 Subject: [PATCH 2/6] fixing supply-chain attack vulnerability --- app/backend/package-lock.json | 2 +- app/backend/package.json | 2 +- app/frontend/package-lock.json | 2 +- app/frontend/package.json | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/app/backend/package-lock.json b/app/backend/package-lock.json index af8b754..f230eac 100644 --- a/app/backend/package-lock.json +++ b/app/backend/package-lock.json @@ -1,5 +1,5 @@ { - "name": "tinycheck-backend", + "name": "@kaspersky/tinycheck-backend", "version": "0.1.0", "lockfileVersion": 1, "requires": true, diff --git a/app/backend/package.json b/app/backend/package.json index d884f31..32c7432 100644 --- a/app/backend/package.json +++ b/app/backend/package.json @@ -1,5 +1,5 @@ { - "name": "tinycheck-backend", + "name": "@kaspersky/tinycheck-backend", "version": "0.1.0", "private": true, "scripts": { diff --git a/app/frontend/package-lock.json b/app/frontend/package-lock.json index f893086..3135948 100644 --- a/app/frontend/package-lock.json +++ b/app/frontend/package-lock.json @@ -1,5 +1,5 @@ { - "name": "tinycheck-new", + "name": "@kaspersky/tinycheck-new", "version": "0.1.0", "lockfileVersion": 1, "requires": true, diff --git a/app/frontend/package.json b/app/frontend/package.json index 126b0c8..aa2f3a0 100644 --- a/app/frontend/package.json +++ b/app/frontend/package.json @@ -1,5 +1,5 @@ { - "name": "tinycheck-new", + "name": "@kaspersky/tinycheck-new", "version": "0.1.0", "private": true, "scripts": { From 59c5f8a45b5c54fef997f380169b17ff147da4a3 Mon Sep 17 00:00:00 2001 From: chebatory Date: Tue, 26 Oct 2021 07:19:43 -0400 Subject: [PATCH 3/6] fixing supply-chain attack vulnerability --- app/backend/package.json | 1 - app/frontend/package.json | 1 - 2 files changed, 2 deletions(-) diff --git a/app/backend/package.json b/app/backend/package.json index 32c7432..cae41be 100644 --- a/app/backend/package.json +++ b/app/backend/package.json @@ -1,7 +1,6 @@ { "name": "@kaspersky/tinycheck-backend", "version": "0.1.0", - "private": true, "scripts": { "serve": "vue-cli-service serve --copy --port=4201", "build": "vue-cli-service build", diff --git a/app/frontend/package.json b/app/frontend/package.json index aa2f3a0..99a3698 100644 --- a/app/frontend/package.json +++ b/app/frontend/package.json @@ -1,7 +1,6 @@ { "name": "@kaspersky/tinycheck-new", "version": "0.1.0", - "private": true, "scripts": { "serve": "vue-cli-service serve --copy --port=4202", "build": "vue-cli-service build", From ca980a74a3a4894485ed6782ee02c89d39058d8e Mon Sep 17 00:00:00 2001 From: PlazzmiK Date: Wed, 16 Feb 2022 20:14:51 +0100 Subject: [PATCH 4/6] Added six - Fixes issue #93 FIX for issue #93 : ImportError: cannot import name 'collections_abc' from 'six.moves' (unkown location) --- assets/requirements.txt | 1 + 1 file changed, 1 insertion(+) diff --git a/assets/requirements.txt b/assets/requirements.txt index a6affc2..11813be 100644 --- a/assets/requirements.txt +++ b/assets/requirements.txt @@ -16,3 +16,4 @@ qrcode netifaces weasyprint python-whois +six From bc98fa5d92f2080c2c0d5566ea45d1d2d25f78f1 Mon Sep 17 00:00:00 2001 From: tek Date: Tue, 12 Apr 2022 10:39:30 +0200 Subject: [PATCH 5/6] Updates IOC path --- config.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/config.yaml b/config.yaml index 2c87b8d..8bf89c2 100644 --- a/config.yaml +++ b/config.yaml @@ -52,7 +52,7 @@ frontend: user_lang: userlang update: updateoption choose_net: false - + # NETWORK - # Some elements related to the network configuration, such as # the interfaces (updated during the install), the list of SSIDs @@ -77,6 +77,6 @@ network: watchers: iocs: - https://raw.githubusercontent.com/KasperskyLab/TinyCheck/main/assets/iocs.json - - https://raw.githubusercontent.com/Te-k/stalkerware-indicators/master/indicators-for-tinycheck.json + - https://raw.githubusercontent.com/Te-k/stalkerware-indicators/master/generated/indicators-for-tinycheck.json whitelists: - https://raw.githubusercontent.com/KasperskyLab/TinyCheck/main/assets/whitelist.json From b2bbb89baaf2d0d8bfba680edb74f49e053dffc7 Mon Sep 17 00:00:00 2001 From: Julio Poveda Date: Fri, 22 Apr 2022 15:26:34 -0400 Subject: [PATCH 6/6] Minor typo fix and pronoun change suggestion --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 01ffa2a..b8f6a4b 100644 --- a/README.md +++ b/README.md @@ -8,11 +8,11 @@ TinyCheck allows you to easily capture network communications from a smartphone The idea of TinyCheck emerged in a meeting about stalkerware with a [French women's shelter](https://www.centre-hubertine-auclert.fr). During this meeting we talked about how to easily detect [stalkerware](https://stopstalkerware.org/) without installing very technical apps nor doing forensic analysis on the victim's smartphone. The initial concept was to develop a tiny kiosk device based on Raspberry Pi which can be used by non-tech people to test their smartphones against malicious communications issued by stalkerware or any spyware. -Of course, TinyCheck can also be used to spot any malicious communications from cybercrime to state-sponsored implants. It allows the end-user to push his own extended Indicators of Compromise via a backend in order to detect some ghosts over the wire. +Of course, TinyCheck can also be used to spot any malicious communications from cybercrime to state-sponsored implants. It allows the end-user to push their own extended Indicators of Compromise via a backend in order to detect some ghosts over the wire.

If you need more documentation on how to install it, use it and the internals, don't hesitate to take a look at the TinyCheck Wiki.

-

If you have any question about the projet, want to contribute or just send your feedback,
don't hesitate to contact us at tinycheck[@]kaspersky[.]com.

+

If you have any question about the project, want to contribute or just send your feedback,
don't hesitate to contact us at tinycheck[@]kaspersky[.]com.

### Use cases