Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.

SECRET//20350112
Cherry Bomb Program x86 Flytrap User’s Manual
3 (U) Concept
(S) The “x86 Flytrap” is straightforward in concept:
(S) Run the Flytrap implant on non-suspicion arousing hardware, in this
case an x86 laptop, to simulate and overpower an access point (AP).
Unwitting wireless clients associate with this “x86 Flytrap” instead of the
original AP, thus becoming vulnerable to typical Flytrap exploitation. The
“x86 Flytrap” may use the original AP for internet access, although other
sources of internet connectivity could be used as well.
(S) Figure 1 illustrates the concept.
Figure 1 (S): x86 Flytrap Concept
SECRET//20350112
6
Wireless AP:
SSID=“FreeWifi
Channel= 1
x86 Flytrap:
SSID=“FreeWifi
Channel= 6
Internet
Internet
OR
Use “original”
AP for internet
access
Use other method
for internet access:
another AP
wired (ethernet) connection
cellular 3G/4G card
WiMax card
Detachable
Antenna
(optional)
Wireless clients
associate with the
stronger signal of
the x86 Flytrap
“FreeWifi”network

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh