PoSHMagiC0de Posted October 21, 2017 Posted October 21, 2017 Well, would be good with the ducky too if you build a nice reverse connection for this to get you access to it from behind a firewall and build a shell management framework in it. Deploy it on victim network someplace hidden with network access. Use a ducky and/or Bunny to deploy the shell agent to victims at site with some persistence and there you go. On a side notice I did wish that usb could double as a network gadget and then you could probably make this thing an active tap for wireshark when you want one too. :-P Quote
Darren Kitchen Posted October 21, 2017 Posted October 21, 2017 It's a great companion to the USB attack tools, with the right payload. You'll see. Basically drop the Squirrel as a listener for an accompanying payload on the Duck/Bunny. Working on something special for that. Also, noted hardware request. 2 Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.