Jump to content

[Info] Tools


Recommended Posts

Hey everyone,

Recently I have seen a lot of questions in regards to installing tools on the Bash Bunny. This post will contain a list of .deb files published by Hak5. Please see our wiki for installation instructions.

If you would like to suggest a tool to be published, please reply to this thread. All other posts will be removed.


Disclaimer: Hak5 is not responsible for these tools. They are 3rd party packages and have not been checked for stability or security. Hak5 simply packages these tools for easy installation. 

  • Like 3
  • Thanks 1
  • Upvote 6
Link to comment
Share on other sites

  • 11 months later...
  • 3 months later...

For macchanger, I got the source from http://www.gnu.org/software/macchanger and did the following:

  • Put the BashBunny into arming mode (switch 3)
  • Copy the macchanger-X.X.X .tar.gz to the BashBunny; let's say /loot/.
  • Create a payload for Switch 1
cp /root/udisk/loot/macchange.tar.gz /root/.
  • Save, unplug the BB, move to switch 1, and plug back in.
  • When the LED indicates Finished, use your serial terminal program to log into the BB
  • Now, you can compile and install:
# you should already be in /root
tar xfz macchanger-X.X.X.tar.gz
cd macchanger-X.X.X

# NOTE: the following only puts the binary into the BB system.  Use 'make install'
#       if you want everything including docs.
cd src
cp macchanger /usr/bin/.

cd ../..
rm -rf macchanger-X.X.X         # if you want to remove it.


Once done, you'll have macchanger readily available.


Link to comment
Share on other sites

  • 4 weeks later...
On 7/10/2019 at 10:21 PM, Foxtrot said:

I've updated the first post to add a link to the new Metasploit package, but bear in mind that it requires firmware 1.6 or above.

Hi Foxtrot,

Thank you. This makes life a hell of a lot easier🔥🔥🔥 especially when trying to find the precise location for things. I knew if anyone was going to post an update for the questions posed it would be you. Thanks again for making our lives easier🙏

Link to comment
Share on other sites

Was wondering what the official method to update metasploit is? for now I've installed git to clone the repo, then gem install bundle, chown -R the new folder to 1004:1004 and rename it the metasploit-framework and delete the old one. Working well so far, and can run msfupdate. Any thoughts on this being a bad idea to get the latest version?

Link to comment
Share on other sites

  • 2 weeks later...
On 8/8/2019 at 2:45 AM, jblk01 said:

@Foxtrot - As per my pull request on Github, I had to use a newer release of Impacket to achieve setting a username / password combo for the SMB server in my smb_exfiltrator v2 payload.   Would you consider updating the .deb file here with the latest release of Impacket?

The version on impacket posted is here very outdated and does not support authenticated SMB shares... tried to compile it from source but it fails

error: command 'arm-linux-gnueabihf-gcc' failed with exit status 1

Has anyone had any luck compiling?


Link to comment
Share on other sites

  • 2 weeks later...

We are going to need a VM to compile this and redistribute onto the bunny.  You can get the compiling going by install build-essential with aptitude but the Bunny chokes on the compilation on different parts different times.  It cannot handle it.  If you want to continue to try then apt install build-essential while inet sharing and try the pip install -r requirements.txt again to see if it compiles.  You will also need to pip install --upgrade setuptools to get rid of another error.

I gave up when I saw it was compiling as I know any compilation I did on the bunny that pushed it usually locks up.


Link to comment
Share on other sites

  • 1 month later...
  • 1 year later...

I am unsure why Hak5 never lets me login until the 7th or 8th time but...


What other tools should we be looking to install into the /tools dir?

what can we do to make the Mark II better? I just got it yesterday and I am still learning it and work in Web design and IT at my college and this thing is magical, I just cannot get the right payloads to work correctly.


I have used 6 of those credential payloads and none of them dumped any correct password or much.

Link to comment
Share on other sites

Remember that most of the Mk1 payloads available are years old and the landscape is constantly changing and evolving. It's a cat and mouse game and if the payloads aren't updated (or new ones are created based on recent vulnerabilities or functionality), they most likely turn obsolete.

  • Upvote 2
Link to comment
Share on other sites

Ah, that is true. I am starting to rewrite some of them and I need mimikatz for one. We should be able to install: 
1. Mimikatz
2. setoolkit
3. airmon-ng

I am unsure what else but aren't we able to fire up a Kali Linux VM and launch a Bash Bunny interface or better yet, sudo apt install <package> ? 

I am going to have to mess with this A LOT more this weekend otherwise most of these payloads are obsolete or work very poorly and I work in the IT and Web Development departments. So, I was able to test this Bash Bunny Mark II on about a dozen laptops today and several PC's and other hardware devices. 

Whether logged in or not, most of the payloads did not work except DumpCreds 2.1, where I do not see any information of mine that is worth anything to anyone. 

When I turn the switch on 1 or 2 and plug it in, it goes. 

We just need more tools and updated payloads that bypass newer issues or more creative ways to do things and my name is AgtShadow and I am here to help and have PLENTY of hardware to test this on (yes, my supervisor knows). So does the network admin haha. 

  • Like 1
  • Upvote 1
Link to comment
Share on other sites

  • 2 months later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...