Jump to content

1N3

Active Members
  • Posts

    13
  • Joined

  • Last visited

Posts posted by 1N3

  1. Testing the BashBunny for use on a physical pentest/red team engagement but noticing a huge problem with using this device for a real world assessment. Mainly, on a Windows 7 x64 desktop, the initial driver install process took over 2 minutes to install. After initial drivers are installed, my payload initializes and finishes within 10 seconds which is great if only I didn't have to install the drivers first...

    What makes this issue even worse is that the BashBunny doesn't wait until the drivers have been installed before executing the payload which means you need to unplug/re-plug the device in after waiting 2 minutes to execute the payload. Ideally, it would be nice to build some code into the BashBunny to automatically detect when the drivers are installed and then run the payload.

    Has anyone had any issues with this and is there any way to improve the speed here? 2 minutes is wayyy to long to wait around at an unlocked workstation. I would be better off typing out the payload by hand if it meant only taking 20-30 seconds max.

  2. As a pentester, I find myself checking random fields and forms for arbitrary code execution and came across a code execution flaw in the log viewer infusion for the Pineapple. This isn't technically a vulnerability since you need to be logged in as root but it's still un-intended functionality resulting in arbitrary code execution.... Regardless of the impact, I enjoy finding things like this so here it is... enjoy!

    https://www.youtube.com/watch?v=I_i2RhfB-Z8

  3. Even better, Burpsuite has options to redirect all HTTPS -> HTTP and on SSL negotiation failure, does SSL pass-through automatically (thus not breaking the connection for sites like Google to the client, etc.). Seems to be working pretty good here aside from not seeing all HTTPS traffic...

  4. I'm trying to get Burpsuite integrated with PineAP on a PineappleV... is it possible?

    Here is my setup:

    - Wireless router at (192.168.1.1) for connection to the internet

    - PineappleV running PineAP (172.16.24.1/eth0 + 192.168.1.108/wlan1)

    - From the same wifi router, I have a Kali Linux machine at (192.168.1.132) listening on port 8080/tcp running Burpsuite

    My goal is to accept wifi clients connected from PineAP and route any web requests (HTTP/HTTPS) to 192.168.1.32:8080 (Burpsuite).

    Anyone know how to do this?

    Can I just create an iptables pre-routing rule to forward to this IP/port?

  5. I'm unable to retrieve any updates or infusions from the PinappleV web interface today 12/27/2014. It was working earlier today but now I can get a list of available packages... anyone else notice this?

    I am connected to the internet fine and everything else is working great... definitely not an internet connection issue.

    System InfusionsNo system infusions found. Check again later.
    User Infusions - Show
    Command Line Infusions - HideNo command line infusions found. Check again later.
×
×
  • Create New...