How to Pull Wireless Credentials with the Bash Bunny
ATT&CK techniques detected
T1548.002Bypass User Account Control
50%
“the uac elevation permission. now save your changes and eject the drive. to launch the attack move the switch to the switch position where you stored the payloads, in my case switch position 1 ….. … and plug it into an unlocked machine. it took about 7 seconds for this to run on …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1557.001Name Resolution Poisoning and SMB Relay
39%
“these files contains the ssid and where possible ( wep / wpa - psk & wpa2 - psk ), the passphrase : then i tried running the script using an unprivileged account, a “ standard ” user in microsoft lingo. it didn ’ t work. interestingly enough an unprivileged user is allowed to suc…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary

Sally Vandeven // All of the BHIS testers are pretty geeked about Hak5’s newest toy — the Bash Bunny. Last week, Jordan blogged about the USB Exfiltration payload. Today I […]
The post How to Pull Wireless Credentials with the Bash Bunny appeared first on Black Hills Information Security, Inc..