* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
BruteBunny
- Author: Decoy
- Version: Version 1.0
- Target: Windows
Description
I would say that some (most) people don't realize that devices they connect to their networks usually have weak default usernames and passwords. The Brute Bunny will exploit that in hopes of finding some poor sap who didn't change their admin password for their device, and educate them accordingly.
Configuration
Modify the variables in brutebunny.ps1 to change the default IP/Port for this attack. Feel free to use your own wordlists as well; however you will need to adjust some of the sleep times accordingly depending on the length of time your list will take to go through.
Notes
This was designed and tested on a Netgear Nighthawk Router, and an Arris Xfinity Modem/Router combo; however I don't see why it couldn't be used for any internet connected device that uses basic http authentication. And please... Don't feed the bunnies.
STATUS
| LED | Status |
|---|---|
| Purple | Reticulating splines |
| White (blinking) | Waiting for Storage |
| Blue (blinking) | Brute Bunny being a Brute Bunny |
| Green | Hopefully no bunny babies |
Discussion
Not yet