Search the Community
Showing results for tags 'bashbunny '.
Hi Guys, I started this thread to have more discussion about automating similar attacks, in this video i managed (after lots of work and fight) to first get ruby run properly then Metasploit framework installed and running + connected it to Postgresql database + db_autopwn running properly on my BashBunny, scanning the bunny IP range 172.16.64.0/24 with db_nmap, then pass the scan results to metasploit exploitation module and bingo, we can exploit a fully locked devices which running vulnerable OSes/Services. Warning: The video is super long (you are free to escape some minutes) because of the humble specifications of the BashBunny device (i wish we can get an upgraded BashBunny 2.0 with at least 1 or 2 GB of memory and more faster processor for these kind of heavy stuff) Any questions i'm ready to answer! Enjoy watching https://youtu.be/b6U_t8HPKNk
Hello all, I have 4 headless PCs here at my house and I was wondering in the event the internet goes down and I need to do a file transfer or something. Could I just plug the bash bunny in and have it execute a powershell script so I don't have to find a spare monitor and keyboard? Thanks, new to the bashbunny.
So a idea came across my head, can you make the Amazon fire stick work like the Bash bunny. The fire stick it self runs on android which can be easily exploited and flashed. You can probably install Kali-net hunter onto the fire stick however you'd have to rewrite the the OS. If you do so attacks such as HID can be executed. Just an Idea - No name