Exploiting the HippoConnect protocol for HippoRemote
/\____/\ _
/ .. \ /_\ _ __ __ _ _ __ _ _
/ \ / \ //_\\| '_ \ / _` | '__| | | |
| 'X' 'X' | / _ \ | | | (_| | | | |_| |
/ ____________ \ \_/ \_/_| |_|\__, |_| \__, |
, ,' `--' '. . _ |___/ |___/
_| | | |_ /\ /(_)_ __ _ __ ___
/ ' ' ' ' \ / /_/ / | '_ \| '_ \ / _ \
( `,',__________.',' ) / __ /| | |_) | |_) | (_) |
\_ ` .V______V, ' _/ \/ /_/ |_| .__/| .__/ \___/
| | |_| |_|
| ,-. ,-. |
\ ).,( / HippoRemote Hacking Toolset
\___/ \___/ ~n00py~
This script was designed to attack the HippoConnect protocol which is used with the HippoRemote iPhone app and the HippoConnect listener.
All dependancies are met on a default installation of OS X.
python hippo.py --sniff
python hippo.py --crack --wordlist [PATH TO WORDLIST] --challenge [CHALLENGE] --response [RESPONSE]
python hippo.py --inject --target [VICTIM] --port [LISTENER_PORT] --key [PASSWORD] --address [LISTENER_IP] --timing [SECONDS]
For more information view the blog post located here: https://www.n00py.io/2017/01/control-your-mac-with-an-iphone-app-an-analysis-of-hipporemote/
###Future Ideas: