Hak5 – The longest running YouTube show defines Technolust
ThreatWire – News on security, privacy, and internet freedom!
Metasploit Minute – The break down on breaking in with Mubix
HakTip – Essentials for new hackers, enthusiasts, and IT pros
TRUST YOUR TECHNOLUST
Since 2005 we've proclaimed our love for technology with this simple mantra – and we invite you to share in our passion. Welcome!
This payload was made in the style of Q Branch: it provides multiple options for attack and getting out of bad situations. Switching into this payload will place the Bash Bunny in a command waiting mode. BLE beacons are sent to start attacks, including QuickCreds and nmap. A loot self-destruct option is also available. The payload is easily extendable to include any attack you might need in the field. Note other payloads were co-opted into this multimode attack, and to make it easy I used Hak5Darren's code, partially because I imagine he wants to see these payloads extended, and also because I know he appreciates Q Branch. Features • Once active, the Bash Bunny blinks a white LED indicating it is waiting for BLE beacons • Commands may be issued to start classic payloads (nmap, quickcreds), switch modes (USB storage or Ethernet), shutdown for removal, or initiate a loot self-destruct • After attacks are complete, Bash Bunny returns to a waiting state for more commands (except for self destruct and shut down)
This payload is for the Bash Bunny. Simultaneously mimic multiple trusted devices to trick targets into divulging sensitive information without triggering defenses. The Bash Bunny is truly the world's most advanced USB attack platform.
Get your payload in front of thousands. Enter to win over $2,000 in prizes in the Hak5 Payload Awards!
Get the inside scoop on the latest releases, events, popular payloads and Hak5 Gear tips!