Difference between revisions of "Bash Bunny Exploits"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 6: Line 6:


* Operating system: Ubuntu 18.04 bionic amd64, Windows 10
* Operating system: Ubuntu 18.04 bionic amd64, Windows 10
* Hak5 Bash Bunny
* Hardware: Hak5 Bash Bunny


In order to get a general idea about the Bash Bunny, please refer to [[Hak5 Bash Bunny]] or the [https://docs.hak5.org/hc/en-us/categories/360000982534-Bash-Bunny official Hak5 Documentation] and [https://github.com/hak5/bashbunny-payloads Git repository].
In order to get a general idea about the Bash Bunny, please refer to [[Hak5 Bash Bunny]] or the [https://docs.hak5.org/hc/en-us/categories/360000982534-Bash-Bunny official Hak5 Documentation] and [https://github.com/hak5/bashbunny-payloads Git repository].

Revision as of 20:16, 3 October 2021

Summary

This is a DRAFT. The Hak5 Bash Bunny will be used for various exploits which will be explained, documented and evaluated in the following chapters.

Requirements

  • Operating system: Ubuntu 18.04 bionic amd64, Windows 10
  • Hardware: Hak5 Bash Bunny

In order to get a general idea about the Bash Bunny, please refer to Hak5 Bash Bunny or the official Hak5 Documentation and Git repository.

Exploits

Reverse shell on Linux

Password Grabber

References