mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Uploaded SessionBunny
Utilize the famous, here slightly modified SessionGopher script, to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP. Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords. Decide which inforamtion you wanna take with you - save it onto your BashBunny!
This commit is contained in:
22
SessionBunny/README.md
Normal file
22
SessionBunny/README.md
Normal file
@@ -0,0 +1,22 @@
|
||||
**Title: SessionBunny**
|
||||
|
||||
Author: 0iphor13
|
||||
Credit for SessionGopher: Brandon Arvanaghi
|
||||
|
||||
Version: 1.0
|
||||
|
||||
**Instruction:**
|
||||
|
||||
This payload will run the famous SessionGopher script, which was only slightly modified. Searches for PuTTY, WinSCP, and Remote Desktop saved sessions, decrypts saved passwords for WinSCP,
|
||||
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.
|
||||
After you recieve the information, save the items you are interested in simply on your BashBunny.
|
||||
|
||||
#
|
||||
|
||||
**Instruction:**
|
||||
|
||||
Place SessionBunny.ps1 in the same payload switch-folder as your payload.txt
|
||||
#
|
||||
Plug in BashBunny.
|
||||
Wait for the script to finish and decide what you wanna do with the information gathered
|
||||

|
||||
Reference in New Issue
Block a user