Jump to content

Search the Community

Showing results for tags 'usb exfiltration'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 2 results

  1. I just ran the USB Exfiltration script from switch1. The powershell command included the $SWITCH_POSITION text instead of it being expanded. I have the updated bunny_helpers.sh that includes the "export SWITCH_POSITION" command. When I manually changed the payload.txt to point to switch1, the scripts finished perfectly! Original: QUACK STRING powershell ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\$SWITCH_POSITION\d.cmd')" I changed to: QUACK STRING powershell ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\switch1\d.cmd')" Any way I can help debug this? Willing to try anything to help figure this out.
  2. I just ran the USB Exfiltration script on a Windows 10 Home machine. The username is "Mom and Dad". e.cmd seems to fail in this situation. if Exist %USERPROFILE%\Documents evaluates to TRUE, but the xcopy command fails because of the space (I think). When running with: "xcopy /C /Q /G /Y /S %USERPROFILE%\Documents\*.pdf %dst% >>nul" the script makes the folder, but does not copy any files. However, this command gets each file: "xcopy /C /Q /G /Y /S "%USERPROFILE%"\Documents\*.pdf %dst% >>nul" If there is a better way to handle this, let me know. If I have missed something, please let me know!
×
×
  • Create New...