Difference between revisions of "Bash Bunny Exploits"
Jump to navigation
Jump to search
VHorvathova (talk | contribs) |
VHorvathova (talk | contribs) |
||
Line 13: | Line 13: | ||
=== Reverse shell on Linux === | === Reverse shell on Linux === | ||
For this exploit, the [https://github.com/hak5/bashbunny-payloads/tree/master/payloads/library/remote_access/LinuxReverseShell Linux Reverse Shell] payload is used, which is in the <i>remote access</i> category on Bash Bunny's Git Repository. | |||
bashbunny-payloads/payloads/library/remote_access/LinuxReverseShell | |||
Revision as of 12:21, 4 October 2021
Summary
This is a DRAFT. The Hak5 Bash Bunny will be used for various exploits which will be explained, documented and evaluated in the following chapters.
Requirements
- Operating system: Ubuntu 18.04 bionic amd64, Windows 10
- Hardware: Hak5 Bash Bunny
In order to get a general idea about the Bash Bunny, please refer to Hak5 Bash Bunny or the official Hak5 Documentation and Git repository.
Exploits
Reverse shell on Linux
For this exploit, the Linux Reverse Shell payload is used, which is in the remote access category on Bash Bunny's Git Repository.
bashbunny-payloads/payloads/library/remote_access/LinuxReverseShell