PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Getting Started with the Bash Bunny from Hak5

Category: Courses
Author: DrZero
Date added: 25.07.2022 :08:28
Views: 20
Comments: 0










Description material



Published 07/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 8 lectures (32m) | Size: 196.6 MB


Ethical hacking and red team tools


What you'll learn
How to set up the bash bunny
How to use the bash bunny
How to extend and create your own bunny scripts
What to do next

Requirements
You will need a bash bunny usb device.

Description
In this course, you will learn how to gain that crucial initial access using a hardware device called a Bash Bunny. You will explore how to leverage Human Interface Device (HID) emulation to compromise targets, and how to write your own scripts to create custom payloads.

One of the most important parts of a Red Team engagement is the initial access and how to exfiltrate important information to help you gain a deeper foothold into your target environment.

In this course, Initial Access with Bash Bunny, you will learn the capabilities of the BashBunny and why it is a key initial access tool in the red team toolkit.

Threat actors take advantage of physical access to devices in order to obtain credentials stored on the device. APT groups such as DarkVishnya have used Bash Bunny devices to help infiltrate major banks across Europe. Having the ability to covertly plug in a device that hacks your target in seconds and pull out confidential data ready for use with no interaction required can be a game changer for red team members.

You will learn how to utilize this tool to help you achieve your red team goals. Within this course you will learn about bunny scripts, how to load them and even modify them to help obtain and exfiltrate key files and information from your target.

The Bash Bunny is amazingly adaptable and can also be used to launch a number of attacks at multiple stages of the cyber kill chain including launching stagers for Empire and you will also show you where to find additional resources to help craft your perfect attack vector for those specialist jobs.

When you have finished with this course, you will have the skills and knowledge to perform attacks from your team that simulate APT capability against your client

Who this course is for
Beginners who have just purchased a BashBunny device or those that at looking at getting one.






https://nitro.download/view/43DE075A507E282/Getting_Started_with_the_Bash_Bunny_from_Hak5.rar
Warning! You are not allowed to view this text.



Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: