Clone
1
BashBunny Script
appelbaum edited this page 2017-01-07 00:04:21 -08:00

BashBunny brief description

Upon boot, BashBunny runs its interpreter (written in python) like below:
(-l = --language)
(both files cherry.py and payload.txt are in mass storage partition)
/ducky/cherry.py -l $lang /payloads/switch[1|2]/payload.txt

ATTACKMODE must be specified, examples are:

(ATTACKMODE is recommended to be first line of payload.)
ATTACKMODE HID (for hid only attack)
ATTACKMODE WIN HID ETHERNET STORAGE
ATTACKMODE HID STORAGE VID 0XF000 PID 0X1234 (with designated vid/pid to cloak identity)

BashBunny Ducky Interpreter can interpret and run standard Ducky Script.

BashBunny additional keywords (compared to Ducky Script)

  • ATTACKMODE
  • LED (e.g. 'LED R BLINK 200')
  • QUACK STRING cmd, or 'QUACK ALT F4'
  • Q is alias of QUACK
  • QUACK ../windows/hid.xmas.txt, or 'Q ../windows/hid.xmas.txt'
  • Please see /payloads/windows/* for preinstalled examples