Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.

SECRET//20350112
Cherry Bomb Program x86 Flytrap User’s Manual
4.2 (U) Anonymous Wireless Internet Access
(S) A secondary use case of the x86 Flytrap is to offer anonymous wireless internet
access, similar to a “honey pot”. The x86 Flytrap platform minimizes suspicion because
it is a COTS laptop computer with COTS 802.11 hardware. An operative locates the x86
Flytrap in a region of interest. Optionally, the operative attaches an antenna to the x86
Flytrap to improve the strength/range of the 802.11 signal. The operative configures the
x86 Flytrap with an SSID fitting of the scenario and a channel that minimizes
interference. Unwitting wireless clients connect to the x86 Flytrap and are hence
vulnerable to typical Flytrap exploitation.
(S) The x86 Flytrap needs a connection to the internet. In this use case, the x86 Flytrap
could use other open AP’s in the area, the wired ethernet interface (through, for
example, a DSL modem), a USB device (through, for example, a 3G/4G or WiMax USB
stick), etc.
(U) For a detailed description of configuring and running the x86 Flytrap for this
scenario, see the “Quick Start Guide for x86 FT”, section 4.3 (Anonymous Open
Wireless Network that Uses a Wired Network Connection for Internet Access).
SECRET//20350112
8

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh