From 6e0955fb2b00b13a67e43c87d9025087ea0b674b Mon Sep 17 00:00:00 2001 From: Alex Date: Sat, 12 Dec 2020 23:59:29 +0100 Subject: [PATCH 1/3] Update read.md Change configuration description --- payloads/library/credentials/Jackalope/readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/payloads/library/credentials/Jackalope/readme.md b/payloads/library/credentials/Jackalope/readme.md index 52918c81..6b3c4c32 100644 --- a/payloads/library/credentials/Jackalope/readme.md +++ b/payloads/library/credentials/Jackalope/readme.md @@ -26,7 +26,7 @@ Uses ethernet to attempt dictionary attacks against passwords. When the password To clear a stored password move the switch to switch3 (aka arming mode) after the payload runs and displays GREEN. The status light will change to SPECIAL (cyan) indicating the password has been removed. Positioning the switch to switch1 or switch2 will re-initiate the attack. ## Configuration -No initial configuration is required for bunny firmware v1.6+. +You must have metasploit installation up and running in path /tools/metasploit-framework/ ### Per attack configuration 1. userlist.txt contains usernames to use in attack. From fc0fa47dcba46b08012a25a3f6393d716b8c6723 Mon Sep 17 00:00:00 2001 From: Alex Date: Mon, 14 Dec 2020 16:47:55 +0100 Subject: [PATCH 2/3] Jackalope: Update README to show Metasploit dependency. Provided information on the dependency of Metasploit for the payload to work. Provided information on the installation of the tool accordingly. --- payloads/library/credentials/Jackalope/readme.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/payloads/library/credentials/Jackalope/readme.md b/payloads/library/credentials/Jackalope/readme.md index 6b3c4c32..ebe5330e 100644 --- a/payloads/library/credentials/Jackalope/readme.md +++ b/payloads/library/credentials/Jackalope/readme.md @@ -26,7 +26,9 @@ Uses ethernet to attempt dictionary attacks against passwords. When the password To clear a stored password move the switch to switch3 (aka arming mode) after the payload runs and displays GREEN. The status light will change to SPECIAL (cyan) indicating the password has been removed. Positioning the switch to switch1 or switch2 will re-initiate the attack. ## Configuration -You must have metasploit installation up and running in path /tools/metasploit-framework/ +You must have metasploit installation up and running in path /tools/metasploit-framework/ +Information and instructions for the installation of additional tools to the Bash Bunny can be found [here](https://docs.hak5.org/hc/en-us/articles/360010554133-Installing-and-using-additional-tools). +No further initial configuration is required for bunny firmware v1.6+. ### Per attack configuration 1. userlist.txt contains usernames to use in attack. From 3840f5330b70cfcf22db5424a6ea9cf5e499c66b Mon Sep 17 00:00:00 2001 From: Marc Date: Mon, 14 Dec 2020 23:48:44 +0000 Subject: [PATCH 3/3] Jackalope: Small cleanup --- payloads/library/credentials/Jackalope/readme.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/payloads/library/credentials/Jackalope/readme.md b/payloads/library/credentials/Jackalope/readme.md index ebe5330e..2ab711f9 100644 --- a/payloads/library/credentials/Jackalope/readme.md +++ b/payloads/library/credentials/Jackalope/readme.md @@ -26,9 +26,9 @@ Uses ethernet to attempt dictionary attacks against passwords. When the password To clear a stored password move the switch to switch3 (aka arming mode) after the payload runs and displays GREEN. The status light will change to SPECIAL (cyan) indicating the password has been removed. Positioning the switch to switch1 or switch2 will re-initiate the attack. ## Configuration -You must have metasploit installation up and running in path /tools/metasploit-framework/ +You must have a Metasploit installation up and running in path /tools/metasploit-framework/ Information and instructions for the installation of additional tools to the Bash Bunny can be found [here](https://docs.hak5.org/hc/en-us/articles/360010554133-Installing-and-using-additional-tools). -No further initial configuration is required for bunny firmware v1.6+. +No further initial configuration is required for Firmware v1.6+. ### Per attack configuration 1. userlist.txt contains usernames to use in attack.