TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

How to Pull Wireless Credentials with the Bash Bunny

BHIS · 2017-03-23 · Read original ↗

ATT&CK techniques detected

2 predictions
T1548.002Bypass User Account Control
50%
“the uac elevation permission. now save your changes and eject the drive. to launch the attack move the switch to the switch position where you stored the payloads, in my case switch position 1 ….. … and plug it into an unlocked machine. it took about 7 seconds for this to run on …”
T1557.001Name Resolution Poisoning and SMB Relay
39%
“these files contains the ssid and where possible ( wep / wpa - psk & wpa2 - psk ), the passphrase : then i tried running the script using an unprivileged account, a “ standard ” user in microsoft lingo. it didn ’ t work. interestingly enough an unprivileged user is allowed to suc…”

Summary

Sally Vandeven // All of the BHIS testers are pretty geeked about Hak5’s newest toy — the Bash Bunny. Last week, Jordan blogged about the USB Exfiltration payload. Today I […]

The post How to Pull Wireless Credentials with the Bash Bunny appeared first on Black Hills Information Security, Inc..