Jump to content

NightStalker

Active Members
  • Content Count

    45
  • Joined

  • Last visited

  • Days Won

    3

About NightStalker

  • Rank
    Hak5 Fan +
  • Birthday 03/04/1978

Profile Information

  • Gender
    Male
  • Location
    127.0.0.1

Recent Profile Visitors

1,955 profile views
  1. Wow @Darren Kitchen, what an honor to be featured on your show (https://www.youtube.com/watch?v=4B74ig3R9BE&) for such a simple contribution to the community. I am extatic that this script helped people. Thank you so much for being a great host, show and community for enthusiasts like us.
  2. Thank you for the kind words. I am adjusting the timings on the script as I go to find the sweet spots. One of the laptops I tested this on had a big time gap and caused the beginning of the script to be cut off on two of my trial passes so I kept a big delay in the beginning to ensure the machine was fully ready and the bunny was up and running.
  3. Hello all, being a proxy engineer when I got the Bash Bunny the first thing I thought of was how can I force people who are (excuse my assumptions here ) lazy to lock their machines when they walk away and leave them vulnerable. As a pentester an unlocked and unattended machine is a gold mine but you sometimes only have those few precious seconds to gather the data you need. If you could set a proxy and more important a SSL proxy by inserting your certificate as well you could gather all the intel you need even after the initial attack. Enter Proxy Interceptor (Geeky name I know), this pa
  4. My pleasure, just trying to make it a bit easier :)
  5. Hello all, With MAC's (and Linux) you have to know the device of course to serial into it. To make it quicker for me I wrote the below script to search the MAC for the bash bunny (If you have multiple modems this may not work for you) and prompt you to connect to it. Feel free to use and modify as desired. #!/bin/bash # # Title: Mac Serial Connect # Author: NightStalker # Version: 1.0 # # Finds the Bash Bunny in the /dev/cu.* location and # prompt you to connect to it. clear bunnyloc=`ls /dev/cu.* | grep usbmodem` echo "Bash bunny is located at: $bunnyloc" read
  6. Hello Darren, On mine I am running Windows 10 Pro 64-Bit. I did clear all of my payloads and start fresh as well, I get the same failure when it tried to read the files in /root/udisk/payloads/. I would be glad to provide any logs/debugs if you like, just let me know what you need. Regards, NightStalker
  7. I had the same issue with the /root/udev being empty. When I copied payloads over (tools install) and unplugged the bunny the install.sh and readme copied but the directories did not causing the bunny to when trying to execute the payload. After running the command by Foxtrot I can see the data in /root/udisk/ now: root@bunny:~# mount -o sync /dev/nandf /root/udisk/ root@bunny:~# ll /root/udisk/ total 36 drwxr-xr-x 4 root root 4096 Dec 31 16:00 ./ drwx------ 6 root root 4096 Dec 31 16:03 ../ drwxr-xr-x 2 root root 4096 Mar 4 2017 System Volume Information/ drwxr-xr-x 5 root
  8. My name is Alan aka NightStalker Favourite game: Call of Duty Series Favourite OS: Linux Mint Favourite console: Colecovision Nationality: US Accent: None Sex: Male Age: Mid 30's Favourite band: Linkin Park Favourite book: Wifi Pineapple Booklet :) Favourite movie: Top Gun Favourite TV Show: The Walking Dead Favourite actress: Vanessa Lachey Favourite Pinup: All Elvgren Pinups Favourite Comedian: Gabriel Iglesias aka. FLUFFY :) Other hobbies: Certification Junkie, photography. Occupation: Escalation Engineer for a security company.
×
×
  • Create New...