BashBunny brief description
Upon boot, BashBunny runs its interpreter (written in python) like below:
(-l = --language)
(both files cherry.py and payload.txt are in mass storage partition)
/ducky/cherry.py -l $lang /payloads/switch[1|2]/payload.txt
ATTACKMODE must be specified, examples are:
(ATTACKMODE is recommended to be first line of payload.)
ATTACKMODE HID (for hid only attack)
ATTACKMODE WIN HID ETHERNET STORAGE
ATTACKMODE HID STORAGE VID 0XF000 PID 0X1234 (with designated vid/pid to cloak identity)
BashBunny Ducky Interpreter can interpret and run standard Ducky Script.
BashBunny additional keywords (compared to Ducky Script)
- ATTACKMODE
- LED (e.g. 'LED R BLINK 200')
- QUACK STRING cmd, or 'QUACK ALT F4'
- Q is alias of QUACK
- QUACK ../windows/hid.xmas.txt, or 'Q ../windows/hid.xmas.txt'
- Please see /payloads/windows/* for preinstalled examples