In this article, we will discuss detail a very interesting device called Bash Bunny in detail. Let’s take a look at how to obtain, configure, write your own custom payloads, and use the Bash Bunny to launch effective attacks.
Social networks allow us to connect with people from all over the world in almost no time. These platforms have changed the way we interact with others. In earlier times, the first thing we did in the morning was to buy a newspaper to see what happened in the world around us, but today, most of us just check our social media accounts. This is our connection to the world today. Just one click and we can see pictures from exotic places and watch videos of small cute kittens. These networks connect us with the world in a way previously unthinkable. But along with all the goods things they offer (speaking mostly about the kittens), there are also coming threats and new attack vectors that evil social engineers would be happy to use to their advantage. Nowadays, it is therefore necessary to be wary of the ever present scams on social networks. Now, let’s take a look at the most common scams used by social engineers, and also how to defend against these types of attacks.
There is no better place to start than with the most famous con artist in history, Viktor Lustig. Although Viktor Lustig was a con man for most of his life, he became famous mainly for his scam in which he "sold" the Eiffel Tower. Let's take a closer look at how this scam, unimaginable in our times, was carried out