Jump to content

GermanNoob

Active Members
  • Content Count

    160
  • Joined

  • Last visited

  • Days Won

    1

1 Follower

About GermanNoob

  • Rank
    Hak5 Zombie

Profile Information

  • Gender
    Male
  • Location
    Germany
  • Interests
    IT related: networks, security, defense
    others: golf, climbing, hiking

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Hi everybody, I got the following problem with the new firmware version: In Recon mode I do not capture all SSIDs in my area (and therefore can't add them to the PineAP Filter). I receive some of the SSIDs but not all. Any idea what I'm doing wrong? Thanks for your help!
  2. @SchwarzerLotus What's your firmware version?
  3. Hi there, I don't understand what you are trying to achieve... Why do you want different mass storages for logging and tools?
  4. Privilege escalation is quite a complicated topic... You will have to analyze the machine on different vulnerabilities. I don't think that it is suitable to use BB for this. Have a look at the these two links to get an idea of the many ways that are possible to escalate privileges on windows and linux: https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ https://toshellandback.com/2015/11/24/ms-priv-esc/
  5. @PoSHMagiC0de, for sure you are right... What I'm doing in the social engineering attack is: ask the legit user to print a file for me, that's on the BB connecting the BB with ATTACKMODE STORAGE and SEWAIT getting the legit user to pick up the print out or talking about something completely different (i.e. getting his attention away from the display) changing switch position to get the payload executed
  6. Hi @Am3ience, according your first question: Could you give us more information. Which distro are you using and can you give us the output of "ls -l" of the bunny folder after you copied it there. According the second question: You should find the payloads (when sshed in) under /root/udisk/payloads
  7. Hi @Samyo, so you want to insert the BashBunny to the victim and show the user some pictures on the STORAGE (ATTACKMODE STORAGE), right? I did a "Social Engineering Wait" which you can find on Github: https://github.com/hak5/bashbunny-payloads/pull/328
  8. No, this just needs ATTACKMODE HID & STORAGE. Have a look at some payloads, that use these ATTACKMODES in combination and access the BASHBUNNY storage folder from the victim. Don't go out there and run ANY payloads that you don't understand!!!
  9. if you have it on the BashBunny STORAGE partition you can run it from there on the victim computer. No need to copy it first.
  10. No, just start a nmap executable from the STORAGE location, but you have to run it from the victim computer. The other way would be to utilize port forwarding on the victim computer. then you should be able to scan with nmap from the BashBunny... Method A (STORAGE) would be easier to do...
  11. Not 100% correct: BB tells you with GET TARGET_IP the IP of the target computer on the BashBunny Ethernet adapter. The victim computer leases the IP from the BashBunny which gives the IP 172.16.64.10 to the victim. As said before: If you want to scan another network adapter you can do it by using a HID & storage attack (starting nmap from storage on the victim computer) or with a HID & ETHERNET attack by pivoting through the victim computer.
  12. What Firmware version are you using?
  13. well, I tested them in a windows vm and this short test payload works fine with both lines: LED SETUP variable=TEST LED ATTACK ATTACKMODE HID WAIT RUN WIN powershell sleep 1 Q STRING "start 'AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\"$variable"\'" LED FINISH
  14. Hi @PoSHMagiC0de, well, I never experienced any problems using BB with an vm. Depending on which system you use (VMware or VirtualBox) you can tell the software just to add the USB device directly to the vm... It's just easy....
  15. well, this should work: Q STRING 'payloads\'$variable "'AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'" Q STRING "start 'AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\\"$variable"\'"
×
×
  • Create New...