Jump to content

Tylor B.

Active Members
  • Content Count

    12
  • Joined

  • Last visited

About Tylor B.

  • Rank
    Hackling

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Okay, I was looking at this attack more, first I fired up a wireshark, and listened while I turned on on off the robot, pair and disconnected them, and sent controls. I was able to find lots of garbled packets, things that were kinda regular with off/on actions, I was doing this at school where the network situation is terrible, there was a lot of background noise, and it was hard to find what was VEX and what was not. When we were at competition our robot did end up disconnecting during the match, and they just said too bad, you do not get any points this round because the protocol is bad, an
  2. Hello people, I was recently doing some work with those VEX Robotics wireless control robots and I had some ideas about packet sniffing attacks, replay attacks, man in the middle attacks, and de-authentication attacks. The robots use the Vex cortex, which has a wireless adapter through a USB port, it says that is is 2.4 GHz, and another USB wireless adapter is plunged into a controller, like a joystick. My school did a competition with these robots, and it ended last week, now we are doing another thing just as a school, they said we were doing battle bots. When I did some research I
  3. @terrier Was the LED working before the firmware loss and attempted recovery? If not you could try checking the pins with a Multimeter to check for continuity on the light and to check for any other physical damage, also try changing USB ports to check if there is a problem with the current draw. Also can you run a payload just LED and then the colors?
  4. If switching it back and forth does not work you could try to launch it and route it into a VM then restrict privileges to induce kernel panic, do not have mine yet but just an idea.
  5. I have not received my bunny yet (march 10th batch) but had an idea for this, because of the limited space on the bunny 8 GB SSD would it be possible to reroute the loot file directory onto another usb drive then cd /media/usr_name/drive_name/loot then store files on the other larger/faster driver? would have to have a variable for the usr_name then once found use that to cd onto the other drive I will try to develop farther once I receive mine but anybody got any ideas for this?
  6. I'm not sure but it doesn't look like there is a reset button but you could probably force it to fail to boot three times then it will reset automatically.
  7. I was wondering a few things about the Bunny's hardware, first is there any way to get more than 8GB of storage? Second if there is anything like the SD card slot on the Ducky or any other ports, hidden buttons, debugging pins, or any other notable way to interact with it other than the USB, light, and switch? And thirdly I was wondering if it is possible to get a look inside the Bunny? is it possible to open it like the Ducky's inconspicuous carrying case? and if it is sealed shut do you have any way to give us an inside look at the hardware? Thanks.
  8. It is like the USB rubber ducky in how it can act like a keyboard to exploit the computers trust in humans but it can leverage that to do much more. Along with pretending to be a keyboard it can pretend to be other devices: an Ethernet over USB adapter, a serial port and a storage device. Because of this it can preform more and more complex attacks. It is also a fully functioning computer unlike the duck and can have multiple payloads. Just for keystroke injection the duck is better because of faster times and smaller size. Ducky pros, smaller, faster, more inconspicuous (looks like your stand
  9. You can use it like a HID keyboard like the ducky but it can also act as: Ethernet over USB via RNDIS or ECM, a storage device like a normal flash drive, a serial port and connection, and a human interface device like The USB Rubber Ducky. It is also a fully functional Debian based Linux box and can be programmed in a text editor not needing to be encoded to an inject.bin file. It has a three phase switch the first being arming/computing the second and third are spaces for payloads. It can also act as a "Pineapple core" where it interacts with the WiFi Pineapple.
  10. _____ _____ _____ _____ _____ _____ _____ _____ __ __ (\___/) | __ || _ || __|| | | | __ || | || | || | || | | (='.'=) | __ -|| ||__ || | | __ -|| | || | | || | | ||_ _| (")_(") |_____||__|__||_____||__|__| |_____||_____||_|___||_|___| |_|
  11. From the video it looked like you have two attack vectors and an arming mode, not sure if you could change ATTACKMODE after defining it to use multiple trusted devices in one payload.
  12. Yeah its on the store and 2 videos sale for $99.99 normal $119.99,
×
×
  • Create New...