Jump to content

Search the Community

Showing results for tags 'bash bunny'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • New USB Rubber Ducky
    • WiFi Pineapple
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
    • WiFi Coconut
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Legacy Devices
    • Classic USB Rubber Ducky
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

  1. Hi there, I started playing with Bash Bunny, I would like to unlock a Windows PC, without knowing the password, for security measures I cannot reset the password. I have seen the Bunnypicker (Win10 Lockpicker for Bash Bunny) payload, listed on official GitHub repo. Has anyone worked with it? I have the following question as this person mentioned in the GitHub issue. I will list the questions here as well: 1. What does JtR means? 2. Where do I run the following commands? In Windows, on the Setup machine (a Windows where I setup the BashBunny USB stick) ? Based on what I have seen, the below commands can be run on a Windows Machine with Linux subsystem activated (WSL2). Am I missing something?
  2. I am quite new to the world of hacking, and recently I have invested in the lan-turtle, and I was wondering what everyone's suggestions were on what Hak5 tool I should invest in next? '
  3. I'm selling my collection to fund a camera lens. To be frank, I simply do not have the time to play with these anymore. WiFi Pineapple Nano WiFi Pineapple IV Bash Bunny USB Rubber Ducky Throwing Star LAN Tap Kit Tactical Bag Selection of Antennas Cable Bag + connectorsComplete Kit Aluminium Carry Case Pineapple Juice Battery Pack ALFA usb network card J Link usb Network Card 8gb micro sd card I am based in the UK. I'm looking for sensible offers. I'm affraid this is sold as a bundle so will not be splitting it. £350 + shipping
  4. While we all wait I thought I'd put together the Hak5 Kit To Rule Them All (it's a slow day in school today). Long Range USB WiFi Adapter $19.99 Micro Ethernet Switch $14.99 WiFi Pineapple - TETRA $199.99 WiFi Pineapple - NANO $99.99 Hak5 Field Kit Pocket Guide $19.99 WiFi Pineappling Book $12.00 LAN Turtle - LAN Turtle 3G $250.00 LAN Turtle - LAN Turtle SD $54.99 LAN Turtle - LAN Turtle Classic $44.99 USB Rubber Ducky - USB Rubber Ducky Deluxe $44.99 Bash Bunny $99.99 Packet Squirrel $59.99 SUBTOTAL: $921.90 Adapters & Cables: USB OTG adapter Micro USB Y-Cable USB A to USB C adapter USB A male to female extension Micro SD USB card reader Micro USB cables USB Ethernet adapter Retractable Ethernet cable Elite Hak5 Gear organizer Pair of Trust Your Technolust key-ring flight tags Anker PowerCore+ 13400 USB Battery SUBTOTAL: $????
  5. I have purchased about 80% of your equipment, Pineapple Mark V, Nano tactical, bash bunny, pocket squirrel, lan turtle, usb rubber ducky, router, wifi dongles, etc. Unfortunately I purchased them separately as they came out. Therefore I don't have a custom Hak5 case to keep them in. I wish you would consider selling the cases separately. I would be your first customer to buy one. Love your products, and the show.
  6. Hi Hak5, are there any plans to release an android app to allow the configuration of the Hak5 goodies? This is something I would be willing to pay for.
  7. Taking the idea (again, mad props to sudoBackdoor) a bit further with some python scripting, I scared myself (and unintentionally pwned myself a few times as well) with this thing. How it works: The user's .bash_profile or .bashrc gets tweaked to point to ~/.config/sudo A python script called sudo is installed there. [Patience is required here, as you need to wait for the user to sudo some command now] This will take their password, validate it by running its own sudo command (literally just echoing something) and seeing if it works Once it confirms a good password, it stores the password for later retrieval and executes the intended sudo command in a subshell that the user shouldn't even notice a difference in After executing their command, it will use the password to sudo open up a reverse https meterpreter session on the machine. It will do this every time sudo is run. I unintentionally self pwned a few times, because the meterpreter session is being run as root, and one must sudo kill to get rid of it. Sudo killing it will get rid of the existing session as expected, but then will open up a shiny new session as its last step (unless the python script is gone). Because antivirus tends to recognize the base64-encoded meterpreter payload as malicious, I also wrote a script called "shellSmuggler.py" to go with it. If you use the msfvenom command I supply here, you should be able to pipe the output to the shellSmuggler and scramble the payload enough that antivirus doesn't alert on/block it anymore. You will need to know your listening machine's IP and listening port (obviously).
  8. Guys I just got my BB and I updated it to the latest firmware and I downloaded all the payloads but none of them works (more specifically they create an empty folder in "loots" with the name of the payload )... I assumed it was because I didn't have any tools.... so I downloaded all of the tools from the " hak5 forums" ... and in order for the tools to install I should unplug and plug my BB in arming mode again) but every time I open my " tools " folder in my BB it's empty ( despite I downloaded them several times) ...what is the problem?.... what should I do? PS ( I'm working with windows 10)
  9. Guys I downloaded all the 3 tools in the forum but I don't know if they are installed or not and by the way non of the payloads are working
  10. Harllen Dias

    Tools

    boa tarde, estou com dificuldades para instalar as ferramentas o meu Bash bunny, copiei os arquivos .deb para tools mas não instala quando conecto em modo armamento os arquivos ainda estão lá, o Firmware v1.3 esta instalado. desculpe pelo ingles
  11. Hi, My friend came into my dorm room(when I was in class) and messed everything up so as a little present I'm planning to run a fork bomb command on his macbook air. Don't worry, it won't mess up his mac for good. The macs are school-given, and so the terminal is disabled. Can I store iterm2 on the bash bunny and have it run the iterm2? If so, how?
  12. Hello I am thinking of buying a smash rabbit and I want to find out a way to ssh into it. I heard that if I want to SSH into the rabbit I have to "waste" a payload for the bunny to emulate RNIDS_ETHER. Is this correct? Or is there some other way for it to emulate a usb-to-ethernet adapter upon boot without having to use a payload? I dunno, stick something in the .profile? Thanks!
  13. Hi, if I install avahi-daemon and put ATTACKMODE RNIDS_ETHER in something like .bashrc or .profile, can I SSH into the bunny with sudo ssh root@bunny.local? I greatly prefer SSH over serial so I would really like my method above to work. I don't own a bash bunny, although I might buy it at some point, I'm just considering. Thanks!
  14. Hello fellow elite haxors I am thinking of buying a Bash Bunny and I'm wondering, How do you get internet on the thing? There's no wifi card, nor did I hear anywhere that you can share network from the host computer to the bunny via USB(or can it?). Can someone please tell me how to get internet access on the Smash Rabbit? Thanks! Eric MIn
  15. Hi, I saw one of Shannon's podcasts and Darren said that the Bash Bunny is Debian, so you can "sudo apt-get install whatever you want". Is this true? Does the Bash Bunny have wifi? Because in the release video they didn't say anything about the Bunny having built-in wifi, nor does the product page. If it doesn't, can you share the internet connection from my computer to the Bunny? Thanks!
  16. deck_bsd

    QuickCreds

    Hi everybody, I just flashed my bash bunny to the new 1.3 version of the firmware. I would like to test the QuickCreds payload on my windows 10 Enterprise. It seems to be stuck in yellow mode (LED ATTACK) forever. Responder is correctly installed into the tools folder. In loot/QuickCreds i have a good folder name but nothing into it. I m doing something wrong ? i have noticed some few thins like, in the payload , it is using the -P option but responder.py doesn 't have it, i erased it, but nothing change. Any ideas ? The thing is, before i just change the LED color , when i tried QuickCreds, after the setup light it was directly the blinking green ligh (i didn't get the yellow one, that's why i would like to test it). After i modified those LED instruction (juste the LED i promes) , the payload always stay in yellow mode. Thanks in advance for your support :-)
  17. Hi, Can I control the serial terminal with my mouse/trackpad? For example, if I open up a long file in vim on the bash bunny, can I scroll up and down with the host computer mouse? Thanks! Also, one more question: can the Bash Bunny be SSH'ed into? I prefer SSH over serial.
  18. Hi, I'm a novice pentester and I'm thinking of buying the bash bunny. Is the ascii art customizable? If so, where is the ascii art file? I know this is really unimportant but I really really like adding custom ascii art on linux machines so I just have to do it. :p Thanks! P.S. How is the serial console? Does the console text resolution match that of the host computer's?
  19. I just bought a Bash Bunny, how can I develop my own attackmode module. Is it feasible to create a USB Monitor that takes screenshots at intervals?
  20. When I connect the Bash Bunny with ATTACKMODE RNDIS_ETHERNET it sets itself as a default network interface, which is desired in most cases. However, I would like it to show up as a secondary interface as part of my payload requires actual internet. Since the Bash Bunny doesn't have internet itself, it can't provide internet to the windows box. It would be nice if I could configure the Bash Bunny to show up as a non-default interface. It is possible to change the metric in powershell, so if my payload uses powershell, I can do this to change it: Get-NetAdapter | Where-Object -FilterScript {$_.LinkSpeed -Eq "2 Gbps"} | Set-NetIPInterface -InterfaceMetric 100
  21. Need help on what exactly does "mount -o sync /dev/nandf /root/udisk" do? do I run it as a payload with attackmode serial? or while in side of putty?
  22. I just recently received my Bash Bunny and was struggling to install the tools. I decided to mess around with the install.sh and ended up causing the Bash Bunny to become stuck. I removed the Bash Bunny and cannot get it to do anything now. When plugged in the green LED goes of for about 2 seconds then goes off... Nothing happens after that and changing the switch does nothing different. I have no clue on what I can do... thanks for any responses.
  23. Hello, I've been playing with a small circuit for my Bunny... I've put three USB connectors on a small board, 1 for the Bunny, 1 for the Target PC, and a switched one for a small battery bank (I use a cylinder type). I have just run power from the battery bank connector to the Bunny and did not hook up power from the Target at all. With this setup, I can run attacks on USB 2 only devices; and, more importantly pre-boot the Bunny before the attack... Flip switch, wait for Bunny to boot, then plug into Target... I don't use the Bunny for keyboard injection, btw - I still prefer my Rubber Ducky for that. This kind of setup could easily be added to the base Bunny, or as an alternative hardware version - with a single usb jack on the back to accept the battery bank connector. A more sophisticated circuit could be setup to detect if power was available at the Target and allow the battery bank to be removed. Pre-boot Bunny, plug into Target, pull and palm battery. The only complication is that it would be a lot of torque on the Bunny's main connector if the battery had to be left connected for a USB 2 Target...
  24. So I've successfully dumped NTLMv2 hashes from a locked PC and I am stuck on what you can do with them from there. With the new security updates regarding token based filtering trying to pass the hash or remote login without being a SID 500 is almost useless and unless you have access to a descent size GPU cluster trying to crack NTLMv2 will also be a challenge. If someone can enlighten me on some ways to gain a foothold with those hashes im all ears
  25. really confused on how to setup quick creds on the bash bunny...Found different steps to take but no tutorials or documentation on the configuration and setup. Also another thing I was thinking about is what if I am out on an engagement and said company has 2 step verification. Does this attack still work?
×
×
  • Create New...