Wednesday, June 12, 2013


Bunny is intended to act as a layer 1/2 technology that attempts to hide its wireless mesh communication traffic. Bunny wraps all data in and out in a layer of obfuscation. It does this by passively listening to the local wireless and building a model of 'average' traffic. Then using this model, it hides small snippets of data within various fields of the 802.11 protocol that are either poorly defined or prone to contain data that mutates a lot. These fields will include but are not limited to, vendor data, data packets of encrypted networks, duration fields.

For full whitepaper like decription of Bunny, check proposal.txt.

You need a monitor/injection capable wireless chipset. Please check the aircrack website for compatible cards.


Configuring bunny is as simple as editing the "libbunny/" file

The most important item to modify is the IFACE varible, this sets which wireless interface you will use for Bunny.

Also if you wish to run a non-testing network, delete the '' file and bunny will make a new one with random values.
Distribute this file to the peers on your network. Also Modulus and Remainder values should be changed as well, for help generating mod/remain vaules check testScripts/

Usage ( example code)

sudo python

-l              --   Listen mode, gets packets and prints data
-s [data]       --   Send mode, sends packets over and over
-m              --   Passive profiling of all the channels (1-11)
-c [UserName]   --   Chat client mode
-r              --   Reloop shows the mod/remainder of the specified channel
-p              --   Ping/Pong testing, Run this on one machine and it will
                     respond with a pong.
-k              --   Ping server mode, will repsond to pings with pong and current time

Read more: Github
QR: Inline image 1