Jump to content

Search the Community

Showing results for tags 'extension'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 3 results

  1. Hi there, I just made a small addition to Darren Kitchen's wait.sh for social engineering. If you have to social engineer your way to your target computer, you can just call "SEWAIT" at a suitable part of your payload. BB will be connected as STORAGE and you can download whatever file to your victim user and show it to him. BB will wait until you change the switch position and then start your original payload. Please be aware that if your payload utilizes "GET SWITCH_POSITION" you should call this before "SEWAIT"... Here is the link to the pull request: https://github.com/hak5/bashbunny-payloads/pull/327
  2. So a new extension I wrote to avoid to have to escape special characters for complex powershells. This extension takes a text file containing the powershell command. Example: RUNPOWER switch1/pstxt.txt inside the pstxt.txt file : Set-WinUserLanguageList -LanguageList en-US -force; Basically it takes the contents of the text file and encodes it to a base64 string and passes it to powershell as an encoded command. (also works as obfuscation of the attack code) https://github.com/elkentaro/bashbunny-payloads/blob/master/library/extensions/runpower.sh @elkentaro
  3. Hello Do not bother the I have a question I am looking for extension of them does not like the KGB that File Commnad You can just about 10 of these cases suggest me Of course I could not find by searching ... thank you
×
×
  • Create New...