Difference between revisions of "Bash Bunny Exploits"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 1: Line 1:
== Summary ==  
== Summary ==  
 
This is a DRAFT.
The Hak5 Bash Bunny will be used for various exploits which will be explained, documented and evaluated in the following chapters.
The Hak5 Bash Bunny will be used for various exploits which will be explained, documented and evaluated in the following chapters.


Line 10: Line 10:
In order to get a general idea about the Bash Bunny, please refer to [[Hak5 Bash Bunny]] or the [https://docs.hak5.org/hc/en-us/categories/360000982534-Bash-Bunny official Hak5 Documentation] and [https://github.com/hak5/bashbunny-payloads Git repository].
In order to get a general idea about the Bash Bunny, please refer to [[Hak5 Bash Bunny]] or the [https://docs.hak5.org/hc/en-us/categories/360000982534-Bash-Bunny official Hak5 Documentation] and [https://github.com/hak5/bashbunny-payloads Git repository].


== Description ==
== Exploits ==


=== Reverse shell on Linux ===
=== Reverse shell on Linux ===


=== Password Grabber ===
=== Password Grabber ===
Make sure to read
* War and Peace
* Lord of the Rings
* The Baroque Cycle
== Used Hardware ==
[[Device to be used with this documentation]]
[[Maybe another device to be used with this documentation]]
== Courses ==
* [[A course where this documentation was used]] (2017, 2018)
* [[Another one]] (2018)


== References ==
== References ==

Revision as of 20:15, 3 October 2021

Summary

This is a DRAFT. The Hak5 Bash Bunny will be used for various exploits which will be explained, documented and evaluated in the following chapters.

Requirements

  • Operating system: Ubuntu 18.04 bionic amd64, Windows 10
  • Hak5 Bash Bunny

In order to get a general idea about the Bash Bunny, please refer to Hak5 Bash Bunny or the official Hak5 Documentation and Git repository.

Exploits

Reverse shell on Linux

Password Grabber

References