Jump to content
Hak5 Forums


  • Content count

  • Joined

  • Last visited

About sn0wfa11

  • Rank
  1. Quickcreds issue

    Having the same issue here. Have not gotten this module to work yet.
  2. Upload python scripts

    Yes, you can run your own python scripts from SSH or from a Meterpreter shell if you set up one of those modules. You can also develop modules for the Turtle that echo out a python script and run it, several of the current modules do just that. However, running a keylogger on the Turtle is not going to do you much good since it would be capturing keystrokes on the Turtle and not the computer it is plugged into. The Turtle gets you onto a target's network, then you can use the Turtle as a pivot point to attack other computers. Or you can do MITM attacks against the computer it is plugged into. You would need a shell on the computer it is plugged into before you can capture keystrokes. - sn0wfa11, OSCP
  3. HID NUM/CAPS/SCRL Accessors?

    With the HID drivers in the Bash Bunny, is there any way to read the status of the caps lock, num lock, and scroll lock keys? I ask because with a Teensy 3.2, the status of these keys can be read and it has some nice benefits for the type of HID attacks that can also be done with the Bunny. As in, I've programmed a Teensy to wait until the drivers are loaded before starting an HID attack. It does this by pressing num lock until it registers a status change. Another nice feature is that I have a way to send the Teensy feedback from Metasploit when a shell has been successfully created for the computer that is being attacked so that the Teensy will flash its LED. This would be a nice addition to the Bash Bunny. If anyone knows if these key statuses are accessible, let me know. I'm happy to try to get it working. I'll do some digging around myself as well. Link to my Teensy code is below. https://github.com/sn0wfa11/HID-Attacks - sn0wfa11, OSCP