From d68298eaa3d1d06005324266206e2867902ba144 Mon Sep 17 00:00:00 2001 From: rsxchin <68041324+rsxchin@users.noreply.github.com> Date: Fri, 16 Dec 2022 08:58:09 -1000 Subject: [PATCH] Add GET BB_LABEL function and docs (#569) * Add GET BUNNY_LABEL to get.sh Instead of hardcoding "BashBunny" or whatever new name the Bunny has, attackers can use a GET command. * Add docs for GET HOST_IP & GET BB_LABEL --- docs/readme.txt | 6 +++++- payloads/extensions/get.sh | 4 ++++ 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/docs/readme.txt b/docs/readme.txt index ed0b9437..04f8598f 100644 --- a/docs/readme.txt +++ b/docs/readme.txt @@ -6,7 +6,7 @@ Bash Bunny by Hak5 USB Attack/Automation Platform - -+- QUICK REFERENCE GUIDE v1.4 -+- + -+- QUICK REFERENCE GUIDE v1.5 -+- +-----------------+ @@ -107,6 +107,8 @@ $HOST_IP IP Address of the Bash Bunny (Default: 172.16.64.1) $SWITCH_POSITION "switch1", "switch2" or "switch3" + $BB_LABEL Volume name of the BashBunny + when mounted. @@ -153,6 +155,8 @@ GET TARGET_HOSTNAME Returns $TARGET_HOSTNAME GET HOST_IP Returns $HOST_IP GET SWITCH_POSITION Returns $SWITCH_POSITION + GET TARGET_OS Returns $TARGET_OS + GET BB_LABEL Returns $BB_LABEL diff --git a/payloads/extensions/get.sh b/payloads/extensions/get.sh index 0ebd6e7d..791ad2c0 100755 --- a/payloads/extensions/get.sh +++ b/payloads/extensions/get.sh @@ -26,6 +26,10 @@ function GET() { [[ "${ScanForOS,,}" == *"linux"* ]] && export TARGET_OS='LINUX' && return export TARGET_OS='UNKNOWN' ;; + "BB_LABEL") + export BB_LABEL=$(ls -l /dev/disk/by-label/ | awk '/nandf$/ { print $9 }') + ;; + esac }