Cleanup: usb_exfiltrator: Update Payload Header

This commit is contained in:
Marc 2019-07-05 20:36:52 +01:00 committed by GitHub
parent e3c4e45e29
commit 342a2299c4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -3,14 +3,16 @@
# Title: USB Exfiltrator
# Author: Hak5Darren
# Version: 1.1
# Target: Windows XP SP3+
# Target: Windows XP
# Props: Diggster, IMcPwn
# Category: Exfiltration
#
# Executes d.cmd from the selected switch folder of the Bash Bunny USB Disk partition,
# which in turn executes e.cmd invisibly using i.vbs
# which in turn copies documents to the loot folder on the Bash Bunny.
# Description: Executes d.cmd from the selected switch folder of the Bash Bunny USB Disk partition,
# which in turn executes e.cmd invisibly using i.vbs
# which in turn copies documents to the loot folder on the Bash Bunny.
#
# LEDS:
# Yellow Blink: Attacking
# Green: Finished
GET SWITCH_POSITION
LED ATTACK
ATTACKMODE HID STORAGE