Difference between revisions of "Bash Bunny Exploits"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 17: Line 17:
  bashbunny-payloads/payloads/library/remote_access/LinuxReverseShell
  bashbunny-payloads/payloads/library/remote_access/LinuxReverseShell


The payload itself is a textfile <i>payload.txt</i>and comes with a script <i>a.sh</i> as well.


=== Password Grabber ===
=== Password Grabber ===

Revision as of 12:22, 4 October 2021

Summary

This is a DRAFT. The Hak5 Bash Bunny will be used for various exploits which will be explained, documented and evaluated in the following chapters.

Requirements

  • Operating system: Ubuntu 18.04 bionic amd64, Windows 10
  • Hardware: Hak5 Bash Bunny

In order to get a general idea about the Bash Bunny, please refer to Hak5 Bash Bunny or the official Hak5 Documentation and Git repository.

Exploits

Reverse shell on Linux

For this exploit, the Linux Reverse Shell payload is used, which is in the remote access category on Bash Bunny's Git Repository.

bashbunny-payloads/payloads/library/remote_access/LinuxReverseShell

The payload itself is a textfile payload.txtand comes with a script a.sh as well.

Password Grabber

References