Files

Reverse Shell Mac for Bash Bunny

  • Author: 0dyss3us (KeenanV)
  • Version: 1.2

Description

Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP.

  • Targets MacOS
  • Connection can be closed and reconnected at any time
  • Deploys in roughly 23 sec
  • Works well with NetCat as the listener

Requirements

Have a working Bash Bunny :)

STATUS

LED STATUS
Purple Setup
Amber (Single Blink) Launching Terminal
Amber (Double Blink) Creating cron job
White (Fast Blink) Cleaning up
Green Finished

Configuration and Execution

  1. Plug in Bash Bunny in arming mode
  2. Move files from MacPersistentReverseShell to either switch folder
  3. Edit the payload.txt file and replace ATTACKER_IP with attacker's IP and PORT with whichever port you like to use (I use 1337 😉)
  4. Unplug Bash Bunny and switch it to the position the payload is loaded on
  5. Plug the Bash Bunny into your victim's Mac and wait until the final light turns green (about 30 sec)
  6. Unplug the Bash Bunny and go to attacker's machine
  7. Listen on the port you chose in the payload.txt file on whichever program you'd like (I use NetCat)
    • If using NetCat, run the command nc -nlvp 1337 (replace the port with the port in connect.sh)
  8. Wait for connection (Should take no longer than 1 minute as the cron job runs every minute)
  9. Once a bash shell prompt appears...YOU'RE DONE!! 😃 and you can disconnect and reconnect to the victim at any time as long as the user is logged in

Discussion

Click here to access the forum post.