mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-12-20 03:58:25 +00:00
Reverse Shell Mac for Bash Bunny
- Author: 0dyss3us (KeenanV)
- Version: 1.2
Description
Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP.
- Targets MacOS
- Connection can be closed and reconnected at any time
- Deploys in roughly 23 sec
- Works well with NetCat as the listener
Requirements
Have a working Bash Bunny :)
STATUS
| LED | STATUS |
|---|---|
| Purple | Setup |
| Amber (Single Blink) | Launching Terminal |
| Amber (Double Blink) | Creating cron job |
| White (Fast Blink) | Cleaning up |
| Green | Finished |
Configuration and Execution
- Plug in Bash Bunny in arming mode
- Move files from MacPersistentReverseShell to either switch folder
- Edit the payload.txt file and replace
ATTACKER_IPwith attacker's IP andPORTwith whichever port you like to use (I use 1337 😉) - Unplug Bash Bunny and switch it to the position the payload is loaded on
- Plug the Bash Bunny into your victim's Mac and wait until the final light turns green (about 30 sec)
- Unplug the Bash Bunny and go to attacker's machine
- Listen on the port you chose in the payload.txt file on whichever program you'd like (I use NetCat)
- If using NetCat, run the command
nc -nlvp 1337(replace the port with the port in connect.sh)- If using Windows as the attacker machine, you must install Ncat from: http://nmap.org/dist/ncat-portable-5.59BETA1.zip and use the command
ncatinstead ofncfrom the directory that you installed ncat.exe.
- If using Windows as the attacker machine, you must install Ncat from: http://nmap.org/dist/ncat-portable-5.59BETA1.zip and use the command
- If using NetCat, run the command
- Wait for connection (Should take no longer than 1 minute as the cron job runs every minute)
- Once a bash shell prompt appears...YOU'RE DONE!! 😃 and you can disconnect and reconnect to the victim at any time as long as the user is logged in
Discussion
Click here to access the forum post.