Jump to content

KRAZYPENGWIN

Members
  • Content Count

    2
  • Joined

  • Last visited

About KRAZYPENGWIN

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. @Bob123so I went ahead and added a painful amount of delays and still got nothing. Perhaps I'm not getting the hang of the Bunny Script? For example, this is what I used for the usb exfiltrator: GET SWITCH_POSITION LED ATTACK ATTACKMODE HID STORAGE RUN WIN powershell ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\d.cmd')" Q DELAY 10000 Q DELAY 10000 Q DELAY 10000 Q DELAY 10000 Q DELAY 10000 LED FINISH
  2. I've run over a dozen of Hak5's github scripts on Windows 10-it seems the only ones that work are ones that require only an HID and enter a string of text, or the prank folder. Anything that actually deals with pentest or other attacks, ironically, have no real use. In fact, just about every one that requires a loot folder that I've tried, save the nmapper, has come up empty. This is pretty annoying-I picked this up mostly for the robust library available, and I work almost exclusively with windows machines. It seems to me that outside of the occasional computer that is still running Windows 7
×
×
  • Create New...