Raspberry Pi is small credit card sized, light weight and compact computer available which is used by both professions, hobbyist and of course hackers alike.
Raspberry Pi 3 B is the newest version of Raspberry Pi family.
This mini computer can do (almost) any thing a normal linux machine can do. It is widely used in various industries, robotics, home automation projects.
Sponsor Link
This Project is Sponsored by UTSource. UTSource is a professional electronic components supplier.
You read this blog regularly, you will know that I have been using so many Raspberry Pis for different purposes. I have one for home automation which is placed in hall, which sometimes I will be using as a server, one for my robots, and two Pi Zero Ws in my garage and front door for live surveillance. All are connected to my WiFi network and have SSH enabled for remote access.[AdSense-C]
Once in a while we will have to SSH to each of them to perform some common tasks such as update, upgrade etc. Some days ago, I stumbled upon an article, where this guy built a Portable Hacking Station using Raspberry Pi, where he used an adnroid App named Juice SSH to control a Kali Linux installed Raspberry Pi.
Juice SSH and Cluster Snippets
Juice SSH is an all in one terminal client for Android mobile phones which includes SSH, Local Shell, Mosh and Telnet support. I installed it in my phone and it was quite useful and handy. The app is really user friendly; create a user profile, add a device, add the user to the device and connect.
Then I went through the list of plugins and noticed something called Cluster Snippets. The plugin helps us to execute codes on multiple devices in one go. You can add the code snippet, select all the devices you want the snippet to run, Simply select the snippet you’d like to execute, the connections you’d like to execute it on, and then use tap the run button to execute it.
First take a note of all the devices IP address and port number
Download and install Juice SSH
Go to playstore and search for JuiceSSH
Click Here to download.
[AdSense-C]
Add a Device
Go to Connection tab and click on + button on bottom right to create a new Connection.
Enter your device Name, IP address and port (default 22).
Add an Identity
Create a new identity by tapping the drop down button and add a nickname, username and password
Test your connection
Now go to the connections tab and click on the new Device you added. If everything you have done is correct, it will establish an SSH session to the device.
Download and install Cluster Snippets
Go to playstore and search for Cluster Snippets
Click Here to download.[AdSense-C]
Grant required Permissions
During installation, it will as you permission to grab data such as device details and identity from the JuiceSSH app. After installation, you will see all the devices you added in JuiceSSH in Cluster Snippets app.
Add a Snippet
Now you can add a snippet. Go to options, select snippet manager and add a snippet. Once you finished writing the snippet, click on save.
Select snippet and devices you want to run the snippet
No select the snippet, tick all the devices you want to run the snippet.
Run the snippet
Now click on run snippet. It will now start JuiceSSH and establish connection to all the devices you checked in the previous step. Once connection is established, it will start executing each line of code one by one.
This can be done not only for raspberry pi but all linux devices.
If you have any doubts regarding this you can open up a topic in this forum.
WiFi and WPA Now a days, every office, house, hotel, park, hospital and needless to say everywhere there is wi-fi – Wireless network that enables us to connect our laptops, mobile phones, IOT modules and other smart devices to connect to each other and to internet. But a question still remains – How secure…
Every machine on the the network has a unique number assigned to it, called an IP address. An IP address is similar to your phone number. Your phone number is a unique set of numbers that identifies your phone so that other people can call you. Similarly, an IP address is a unique set of…
Let us do something fun during this weekend shall we? Something less costly and easy for everyone to do. This time, why don’t we play with lights? Let us build a cool blue Automatic Lights just like neon, that will turn on when you walk into the room and turn off when you walk out….
Raspberry Pi is small credit card sized, light weight and compact computer available which is used by both professions, hobbyist and of course hackers alike. Two years ago, Raspberry Pi 3 Model B was released which was the first 64-bit member of the pi family, and our first member with inbuilt WiFi and Bluetooth connectivity….
Kali Linux is one of the best Linux Distribution for security researchers and hobbyists. It packs all the necessary tools advanced network, software and hardware level security testing. In my previous post, I explained about the Test for KRACK attack on Access Points that support FT by Security researcher Vanhoefm. According to a blog post…