Initial Access with the Bash Bunny

Share this Ebook

Initial Access with the Bash Bunny

.MP4, AVC, 1280×720, 30 fps | English, AAC, 2 Ch | 19m | 47.2 MB

Instructor: FC Barker
In this course, you will learn how to gain that crucial initial access using a hardware device called a Bash Bunny. You will explore how to leverage Human Interface Device (HID) emulation to compromise targets, and how to write your own scripts to create custom payloads.

One of the most important parts of a Red Team engagement is the initial access and how to exfiltrate important information to help you gain a deeper foothold into your target environment. In this course, Initial Access with Bash Bunny, you will learn the capabilities of the BashBunny and why it is a key initial access tool in the red team toolkit. Threat actors take advantage of physical access to devices in order to obtain credentials stored on the device. APT groups such as DarkVishnya have used Bash Bunny devices to help infiltrate major banks across Europe. Having the ability to covertly plug in a device that hacks your target in seconds and pull out confidential data ready for use with no interaction required can be a game changer for red team members. You will learn how to utilize this tool to help you achieve your red team goals. Within this course you will learn about bunny scripts, how to load them and even modify them to help obtain and exfiltrate key files and information from your target. The Bash Bunny is amazingly adaptable and can also be used to launch a number of attacks at multiple stages of the cyber kill chain including launching stagers for Empire (covered in Pluralsight course Command and Control with Empire) and you will also show you where to find additional resources to help craft your perfect attack vector for those specialist jobs. When you have finished with this course, you will have the skills and knowledge to perform attacks from your team that simulate APT capability against your client.

Related post:  Dr. Beach's Survival Guide