May 31, 2022 in activity reports by Esther Onfroy3 minutes
PiRogue Tool Suite is a reboot of PiRanhaLysis project. Today, PiRanhaLysis is used by a lot of people ranging from universities (the University of Yale as an example), activists, NGOs and gets a lot of traction. Too much traction in fact to be maintained in our spare time as we have done until now. Currently, the project is at the proof-of-concept stage. To get to wider adoption by the general public, we need to streamline the build process and smooth the interface. Our goal is to make the project accessible to anyone.
The problem: the lack of open-source means (hardware + software) to assess both privacy and security of mobile devices. Depending on HRD goals, they should want to educate, conduct emergency assessment or off-the-field investigations.
The plan: As with all the other projects we do, we are the first users of the technologies we develop and we aim to provide open-source, low-cost, well maintained, easy to use and easy to build hardware and software.
We have three functioning modes for PTS:
a kiosk mode for anyone who wants to know which servers a mobile device is communicating with
an on-the-field mode
an expert mode for technical people to:
The PiRogue is an open hardware device based on a Raspberry Pi operating as a network router (like any ISP router) analyzing network traffic in real time.
You can check out our work on GitHub at https://github.com/PiRogueToolSuite/ or on our website at https://pts-project.org/.
We have started working on the first public release of PTS. We plan to reach out to around 10 NGOs to present the project and if they wish, to test it. The objective for us is to have regular feedback from them in order to better respond to their needs.
We have published two tutorials. The first one presents how to use the PiRogue without wired connection to the Internet (such as in a car). The second one explains how to conduct forensic analysis with MVT.
We started working on a program to automate TLS interception and decryption. It is still WIP but you can already test it on your PiRogue:
You have to connect a rooted Android device to the PiRogue via USB and enable adb
. Hit Ctrl+C
when your experiment is done. The output_dir
folder will contain a PCAP file and a key log file you can open in Wireshark.
We are facing issues dumping TLS keys from system applications with Frida. We are still investigating on this topic.