WEBVTT

00:00:01.340 --> 00:00:02.740
In this short demonstration,

00:00:02.740 --> 00:00:04.760
we're going to show the Bash Bunny being used to

00:00:04.760 --> 00:00:07.850
compromise a target host and exfiltrate data.

00:00:09.040 --> 00:00:11.860
Here we have a fully patched and up‑to‑date Mac laptop.

00:00:12.340 --> 00:00:17.230
I select payload 1, and then plug in the USB device. As I do so, the

00:00:17.230 --> 00:00:19.870
LED flashes to indicate that the attack is happening.

00:00:20.940 --> 00:00:24.750
The Bash Bunny is performing the attack we selected via the switch on the side.

00:00:25.540 --> 00:00:28.080
We then see the LED turn green to let us know that

00:00:28.080 --> 00:00:29.770
the first attack has completed.

00:00:30.740 --> 00:00:34.480
It then turns a solid red to tell us that it has not found any Excel

00:00:34.480 --> 00:00:38.570
documents, and we can now safely unplug and go onto another target.
