Jump to content

The Power Company

Active Members
  • Posts

    78
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by The Power Company

  1. This. Unless you have express permission to try and break into a network, it is against the law to do so. I think you have your priorities a bit mixed up here, if you have no idea how to break into a network, you have no business trying to do so. That isn't to say getting into cybersecurity isn't a good decision, but you have to learn how security works, how networks work, how the local and federal laws surrounding cyberspace work, how various hardware and software toolsets work, etc before you even consider trying to get permission to do a penetration test. Even if you have permission, if you don't know what you are doing and take down something important, there will still be harsh penalties. You don't learn martial arts so that you can beat people up in the street or because there is someone you want to take down (not in the real world, anyways). You learn martial arts for the exercise or for self-defense. Hacking can be thought of in the same fashion. You shouldn't target a lab at your school just because you think it would be fun or a good chance to show off. Hacking isn't like a video game, where your character is instantly proficient with all the tools he finds around. Even if you bought the latest Hak5 tools, a penetration test requires knowledge that months, even years of continuous study and practice to master. If you are interested in going down the path of digital security, that is a wonderful thing. But it is important to learn how to land safely before trying to pilot an airplane.
  2. You don't need a bash bunny for something simple like that, a Rubber Ducky would be just fine if all you need is keystrokes. You simply create a text file with the Duckyscript you want to be typed, encode the text file into a payload using duckencoder, and put it on the Ducky microsd or BashBunny. The difference with the Bash Bunny is it has multiple (well, two) attack modes so it can run two different payloads depending on the situation, and can bring its own exploits since it is really an entire small computer with an automated keyboard, while the Rubber Ducky is just an automated keyboard. Keep in mind, if someone else got their hands on your Bash Bunny or Ducky, they could possibly decode the payload and then they would have your credentials. It would essentially be like carrying around a flash drive with a text file with your passwords and usernames (with a few more steps), so it may not be the best idea from a security standpoint.
×
×
  • Create New...