Uploaded SessionBunny

Utilize the famous, here slightly modified SessionGopher script, to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Decide which inforamtion you wanna take with you - save it onto your BashBunny!
This commit is contained in:
0iphor13
2022-02-11 19:06:06 +01:00
committed by GitHub
parent 387a7fea51
commit 244dbec1eb
4 changed files with 1014 additions and 0 deletions

22
SessionBunny/README.md Normal file
View File

@@ -0,0 +1,22 @@
**Title: SessionBunny**
Author: 0iphor13
Credit for SessionGopher: Brandon Arvanaghi
Version: 1.0
**Instruction:**
This payload will run the famous SessionGopher script, which was only slightly modified. Searches for PuTTY, WinSCP, and Remote Desktop saved sessions, decrypts saved passwords for WinSCP,
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.
After you recieve the information, save the items you are interested in simply on your BashBunny.
#
**Instruction:**
Place SessionBunny.ps1 in the same payload switch-folder as your payload.txt
#
Plug in BashBunny.
Wait for the script to finish and decide what you wanna do with the information gathered
![alt text](https://github.com/0iphor13/bashbunny-payloads/blob/master/payloads/library/credentials/SessionBunny/censorepic.png)