Realstone0001 Posted April 8, 2017 Share Posted April 8, 2017 (edited) Kindly post a tutorial for Concealed exfiltration attacks with bash bunny for Android devices?? Edited April 8, 2017 by Realstone0001 1 Quote Link to comment Share on other sites More sharing options...
unixnerd777 Posted July 3, 2017 Share Posted July 3, 2017 There isn't too much that can be done with most android devices. There is a payload for the Amazon Fire TV (runs android). There is only 1 payload for android and all it does is opens a URL in the default browser. Android is difficult given there is such variety across the various versions. The Fire TV payload works because the Fire TV interface is the same across all of their devices. For example, I tried creating a payload to enable developer mode, and it works on my phone, but not an older tablet. I think the closest that will be possible to this is after someone enables developer mode, then have the BB run adb commands against it. While this isn't perfect it is quite handy - enabling USB debugging isn't too difficult to do and is fairly quick to do. Another caveat with android is that there isn't any (on most devices) ethernet drivers, so adb won't work either (the Fire TV has ethernet drivers, so adb works with the Fire TV as it requires the device work with ethernet)... Quote Link to comment Share on other sites More sharing options...
PoSHMagiC0de Posted July 3, 2017 Share Posted July 3, 2017 Only way I can think of this is do it remotely. Use the BB as a USB/HID attack device. Put device in developer mode and load your own rat into the phone to connect to your machine to do exfiltration. That way you can give the rat all the permissions it needs right at the device. Only way to do that unless the device is rooted then you may have more options. Quote Link to comment Share on other sites More sharing options...
LowValueTarget Posted July 6, 2017 Share Posted July 6, 2017 There's a payload floating around that uses adb remote to connect to an android device. Based on my ideas, there's really not much you can do until BashBunny gets USB host support. I have an idea that will try ADB (assuming the victim phone has USB Debugging enabled) first, then fallback to MTP if ADB is not enabled. This would allow relatively plug-n-play exfil of user data. 1 Quote Link to comment Share on other sites More sharing options...
Dave-ee Jones Posted July 6, 2017 Share Posted July 6, 2017 Refer to this. That should help you out. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.