Jump to content

Recommended Posts

Posted

Well, would be good with the ducky too if you build a nice reverse connection for this to get you access to it from behind a firewall and build a shell management framework in it.  Deploy it on victim network someplace hidden with network access.  Use a ducky and/or Bunny to deploy the shell agent to victims at site with some persistence and there you go.

On a side notice I did wish that usb could double as a network gadget and then you could probably make this thing an active tap for wireshark when you want one too.  :-P

Posted

It's a great companion to the USB attack tools, with the right payload. You'll see. Basically drop the Squirrel as a listener for an accompanying payload on the Duck/Bunny. Working on something special for that.

Also, noted hardware request.

  • Like 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...