Too free, hackers turned virtual chicken raising machines, toys of the 90s into wifi hacking devices for entertainment

Simone Margaritelli, a security researcher and companion, is a hacker with the nickname hexwaxwing who wants to turn hack wifi passwords into a cool entertainment. So they decided to turn Tamagotchi, the virtual chicken breeding device that caused a fever in the '90s into a wifi bomb called Pwnagotchi.

Pwnagotchi - a tool to hack wifi from toys of the 90s

The software for Pwnagotchi, now publicly available on September 19, allows hackers to use it, and it can edit and add plugins to it.

Too free, hackers turned virtual chicken raising machines, toys of the 90s into wifi hacking devices for entertainment Picture 1
Pwnagotchi, wifi hacking device with cute smiley face.

The duo equipped Pwnagotchi with a type of machine learning technique called "deep inforcement learning", which enabled it to detect surrounding Wi-Fi networks and optimize the timing of data collection. information leaked from the 4-way handshake process in the Wifi network. Depending on the location, on a busy street or in the office, Pwnagotchi has different ways of collecting information.

To run the software, you'll need the following: a Raspberry Pi Zero W circuit, a MicroSD card of at least 8GB, an external battery and a 2-inch e-paper screen if you want to see a cute face with many different expressions. The total cost for them is about 60USD, at the time of this writing.

Too free, hackers turned virtual chicken raising machines, toys of the 90s into wifi hacking devices for entertainment Picture 2

Pwnagotchi is an entertaining game for hackers

For hexwaxwing, the most notable highlight of the project is the expressive face. Therefore, the screen is very important.

Hexwaxwing said that smiling face is a special attraction that made many people pay attention to Pwnagotchi. Many hackers are not really interested in data collection or cracking the handshake process of Wifi but just enjoy the idea of ​​a Tamagotchi for hackers and exploit it for entertainment.

For those who are interested in hacking, Pwnagotchi is a great learning tool. This tool has been restricted from causing any denial of service attack on the device to which it collects information. The technology underneath it is completely legal.

Too free, hackers turned virtual chicken raising machines, toys of the 90s into wifi hacking devices for entertainment Picture 3

Margaritelli said the tool's goal is as an educational project for users to learn and entertain with it and motivate vendors to adopt safer Wi-Fi (802.11w) technologies.

  1. Chinese hackers use fingerprints on glass to crack smartphones
  2. Victims hacked hackers' servers when they were caught paying ransom, rescuing thousands of other victims
5 ★ | 2 Vote

May be interested

  • Enigma is hacked, more than $ 470,000 Ethereum is stolenEnigma is hacked, more than $ 470,000 Ethereum is stolen
    an unidentified hacker has stolen ethereum worth more than $ 471,000 - one of the most popular virtual currency and increasing value - in a hack where big virtual money is invested, enigma.
  • Instructions for speeding up virtual machines in full setInstructions for speeding up virtual machines in full set
    virtual machines provide virtual hardware and run multiple operating systems on the computer at the same time. therefore, sometimes its performance will be a bit slow. here are some tips to help you 'squeeze' performance on each virtual machine like virtualbox, vmware, parallels or other virtual machines.
  • How to import Hyper-V virtual machines in Windows 10How to import Hyper-V virtual machines in Windows 10
    you can use hyper-v export and import functions to quickly copy virtual machines. virtual machines can then be used to back up data, or it could be a way to move a virtual machine between hyper-v servers.
  • How to export Hyper-V virtual machines in Windows 10How to export Hyper-V virtual machines in Windows 10
    you can use hyper-v export and import functions to quickly copy virtual machines. virtual machines that are accessed can be used for backup or as a way to migrate a virtual machine between hyper-v servers.
  • How easy is Crack WiFi?How easy is Crack WiFi?
    no matter how much you use your computer, you know a little bit about wifi security, sometimes even more confident when using many ways to protect your wifi. but are they really effective?
  • 9 best free wifi playback software and download link9 best free wifi playback software and download link
    here is a list of the 9 best wifi applications for wifi sharing on your computer for other devices around when solving problems without wifi router. all these wifi broadcast software are free.
  • Basic Hack Techniques - Part IBasic Hack Techniques - Part I
    to all of you, to meet the needs of learning in hacking and security, fantomas311 has compiled a set of basic hacking articles and hacking-related articles to introduce you to.
  • What is WiFi 6? What is WiFi 6E? Things you need to know about WiFi 6 and WiFi 6EWhat is WiFi 6? What is WiFi 6E? Things you need to know about WiFi 6 and WiFi 6E
    help you better understand wifi 6 and wifi 6e, the differences of wifi 6e compared to wifi 6 and other devices using wifi 6e. join us to find out in the article below.
  • Learn 8 online hacker training programs for only 39 USDLearn 8 online hacker training programs for only 39 USD
    because personal data, widely publicized security vulnerabilities are becoming increasingly popular, moral hackers, or white-hat hackers, are being hunted by businesses to help them maintain. maintaining network and data security.
  • Basic hacking techniques - Part IIBasic hacking techniques - Part II
    if the foot printing is collecting all the information related to the destination organization, scan is a step to determine if the other is usable by ping scans, port scanning and detection tools. automatic