• Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Menu
  • Home
  • Become a Hacker
    • Get Started
    • Hacker Mindset
    • Roadmap
    • Simple Setup – Hacker 101
    • Types of Hackers
    • Recommended Courses
  • Boot People Offline
  • Courses
    • All Hacking Courses
    • Cyber Security School
  • CTF
    • Beginners to Advanced Guide
    • Create your own CTF box
    • Field and Resources Guide
    • Platforms & Wargames
    • Tools Used for Solving CTF
    • Writeups
  • Dark Web
    • Beginners Guide
    • Darknet Markets
    • Darkweb 101 (Anonymity Guide)
    • Dark Web OSINT Tools
    • Hacking Forums
    • Latest News
    • Onion Links
  • Hacker Gadgets
  • Hacking Books
  • Tools Directory
Search
Close
  • Home
  • 2019
  • April
  • 24
  • Bash Bunny – Multi-Functional USB Attack Device

Bash Bunny – Multi-Functional USB Attack Device

April 24, 2019 Comments Off on Bash Bunny – Multi-Functional USB Attack Device
bash bunny badusb bash bunny usb

Bash Bunny is a simple and powerful multi-function USB attack device and automation platform for all pentesters and sysadmins, designed by Hak5, which allows you to easily perform multiple USB (badUSB) based attacks.

It’s a tiny and portable Debian based linux computer with a USB interface designed specifically to execute payloads when plugged into a target computer.

           _____  _____  _____  _____     _____  _____  _____  _____  __ __
 (\___/)  | __  ||  _  ||   __||  |  |   | __  ||  |  ||   | ||   | ||  |  |
 (='.'=)  | __ -||     ||__   ||     |   | __ -||  |  || | | || | | ||_   _|
 (")_(")  |_____||__|__||_____||__|__|   |_____||_____||_|___||_|___|  |_|
 Bash Bunny by Hak5                           USB Attack/Automation Platform

Bush Bunny can be used to preform attacks on the following operating systems:

  • Linux, OS X, Windows, Unix-based systems and Android.

This amazing, small and powerful device can run anything that a normal Debian-based linux machines can (linux commands, custom payloads, python scripts, etc.). Once plugged in target machine, Bash Bunny can fake its identity as a keyboard or as other trustworthy media or network device. Therefore, it can mimics the keystrokes, which gives you the ability to inject number of payloads (from Bush Bunny payload repository or your own custom payloads).

How it works?

  1. Load an attack script on the device.
  2. Slide the device switch to “arming mode”.
  3. Plug it into the USB port.
  4. Open payload file/s and
  5. watch the script executes.
Deploying payloads is done by copying a payload.txt to a folder on the Bash Bunny which corresponds with its multi-position payload selector switch. This way carrying multiple payloads and swapping payloads is easy. Select your payload with the switch, plug the Bash Bunny into the victim computer and watch as the multi-color LED indicates the attack status. (Hak5 Bush Bunny docu)

Also read: P4wnP1 – Raspberry Pi USB Attack Platform

Bash Bunny: Powerful USB Attack & Automation Platform [specs, features, design]

The Bash Bunny is a programmable device that contains two separate attack modes and an Arming Mode. It’s very fast, thanks to the powerful quad-core CPU and desktop-class SSD. This feature allows you to finish your pentesting/hacking tasks in seconds. In addition, very simple ‘Bush Script’ scripting language allows you to write scripts in any text editor, even in the basic notepad.

Features:

  • Intelligent exfiltration (keystroke injection attacks, custom payloads)
  • Dedicated shell access from the Arming Mode
  • 3-way payload selector switch
  • Multi-color LED status indicator
  • The “Bunny Script” language (text files, notepad)
  • Centralized payload repository

Hardware Specs:

  • Quad-core ARM Cortex A7
  • 32 K L1/512 K L2 Cache
  • 512 MB DDR3 Memory
  • 8 GB SLC NAND Disk
Bush Bunny Hardware

Hacking with Bush Bunny

Bash Bunny does not allow you to do anything that you can not already do, but the fact that such a small, portable and powerful device can help you a lot in your pentesting and hacking activities, raise the whole thing to a higher level.

  • It’s cross-platform USB flash which is small, portable and most importantly powerful Linux computer with a USB interface.
  • You can imitate keystrokes, steal browser cookies and credentials, steal Wi-Fi passphrases, gain remote access, create and launch backdoors.
  • It enables: Network Hijacking, Keystroke Injection, Intelligent Exfilitration, Dedicated Shell Access, and much more.
  • You can also create reverse shells, download remote files, execute programs and malicious scripts even on the locked-screen machines.
  • You can modify Bash Bunny and enable malicious scripts to execute while victim thinks it’s a normal USB drive.
  • Stolen passwords and access data can be saved to the integrated flash memory, which allows you to access target machine remotely and make some serious damage (open backdoors, download data, run payloads, exploit systems, etc.).
  • In addition, Bush Bunny allows WiFi Pineapple integration with specialized payloads.
  • …

Also read: Increasing Wifi TX Power Signal Strength in Linux

Conclusion

Bash Bunny is truly a very useful physical hacking tool. With this little devil hacking possibilities are limitless. It’s an exciting and fun tool for any pentester, hacker and security professional, but we must say that it’s a bit expensive ($100). If you can’t afford it, you can always make your own Bash Bunny alternative. You will need a few components such as: USB stick, a couple of buttons, switches, resistors, LEDs, a perf board and Raspberry Pi Zero W.

Post navigation

High school Students Arrested for Allegedly Employing Someone from the Dark Web to Hack Their School WIFI
Top 10 Dark Web Search Engines of 2019

Related Articles

HAL – The Hardware Analyzer

- Hardware & Embedded
June 29, 2019

PRET – Hacking Printer Command Languages

- Exploitation, Hardware & Embedded
May 8, 2019July 27, 2019

Killcast – Manipulate Chromecast Devices in your Network

- Hack Tools, Hardware & Embedded
January 16, 2019July 27, 2019
hacker gadgets
hacker phone covers

Recent Posts

CVE-2023-28326: Critical Vulnerability in Apache OpenMeetings

CVE-2023-28326: Critical Vulnerability in Apache OpenMeetings

March 28, 2023
Decider - A Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework

Decider – A Web Application That Assists Network Defenders, Analysts, And Researcher In The Process Of Mapping Adversary Behaviors To The MITRE ATT&CK Framework

March 28, 2023
Android app from China exploited 0-day CVE-2023-20963 flaw

Android app from China exploited 0-day CVE-2023-20963 flaw

March 28, 2023
Geogramint: OSINT Geolocalization tool for Telegram

Geogramint: OSINT Geolocalization tool for Telegram

March 28, 2023
Polaris: open source policy engine for Kubernetes

Polaris: open source policy engine for Kubernetes

March 27, 2023
ThunderCloud - Cloud Exploit Framework

ThunderCloud – Cloud Exploit Framework

March 27, 2023

Social Media Hacking

SocialPath – Track users across Social Media Platforms

SocialPath – Track users across Social Media Platforms

- Social Media Hacking
October 16, 2019October 16, 2019

SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit...

SocialScan – Check Email Address and Username Availability on Online Platforms

SocialScan – Check Email Address and Username Availability on Online Platforms

June 17, 2019
Shellphish – Phishing Tool For 18 Social Media Apps

Shellphish – Phishing Tool For 18 Social Media Apps

June 10, 2019July 27, 2019
WhatsApp Hacking using QRLJacking

WhatsApp Hacking using QRLJacking

May 2, 2019May 19, 2019
How to Hack any Facebook Account with Z-Shadow

How to Hack any Facebook Account with Z-Shadow

April 26, 2019June 29, 2020
hacker buffs

About Us

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Join Our Community!

Please wait...
Get the latest News and Hacking Tools delivered to your inbox.
Don't Worry ! You will not be spammed

Active Members

Submit a Tool

Hackers Handbook 2018


Grab your copy here

ABOUT US

Haxf4rall is a collective, a good starting point and provides a variety of quality material for cyber security professionals.

Our primary focus revolves around the latest tools released in the Infosec community and provide a platform for developers to showcase their skillset and current projects.

COMPANY
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Menu
  • Contact Us
  • Disclaimer
  • Hacker Gadgets
  • LANC Remastered
  • PCPS IP Puller
  • Privacy Policy
  • Sitemap
  • Submit your Tool
Live Chat
RESOURCES
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Menu
  • Attack Process
  • Become a Hacker
  • Career Pathways
  • Dark Web
  • Hacking Books
  • Practice Your Skills
  • Recommended Courses
  • Simple Setup – Hacker 101
Get Started
TOOLBOX
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Menu
  • Anonymity
  • Bruteforce
  • DoS – Denial of Service
  • Information Gathering
  • Phishing
  • SQL Injection
  • Vulnerability Scanners
  • Wifi Hacking
Tools Directory

2014 – 2020 | Haxf4rall.com               Stay Connected:

Facebook Twitter Google-plus Wordpress
Please wait...

Join Our Community

Subscribe now and get your free HACKERS HANDBOOK

Don't Worry ! You will not be spammed
SIGN UP FOR NEWSLETTER NOW