PoSHMagiC0de Posted October 21, 2017 Share Posted October 21, 2017 Well, would be good with the ducky too if you build a nice reverse connection for this to get you access to it from behind a firewall and build a shell management framework in it. Deploy it on victim network someplace hidden with network access. Use a ducky and/or Bunny to deploy the shell agent to victims at site with some persistence and there you go. On a side notice I did wish that usb could double as a network gadget and then you could probably make this thing an active tap for wireshark when you want one too. :-P Quote Link to comment Share on other sites More sharing options...
Darren Kitchen Posted October 21, 2017 Share Posted October 21, 2017 It's a great companion to the USB attack tools, with the right payload. You'll see. Basically drop the Squirrel as a listener for an accompanying payload on the Duck/Bunny. Working on something special for that. Also, noted hardware request. 2 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.