diff --git a/payloads/library/credentials/DumpCreds/payload.txt b/payloads/library/credentials/DumpCreds/payload.txt index 38f59e59..c8b7b054 100644 --- a/payloads/library/credentials/DumpCreds/payload.txt +++ b/payloads/library/credentials/DumpCreds/payload.txt @@ -1,28 +1,25 @@ #!/bin/bash # -# Title: DumpCreds 2.1 -# Author: QDBA -# Version: 2.1.0 -# Build: 1004 -# Category: Exfiltration -# Target: Windows Windows 10 (Powershell) -# Attackmodes: HID, Ethernet -# !!! works only with Bash Bunny FW 1.1 and up !!! +# Title: DumpCreds 2.1 +# Author: QDBA +# Version: 2.1.0 +# Build: 1004 +# Target: Windows 10 +# Attack Modes: HID, RNDIS_ETHERNET +# Description: +# Works only with Bash Bunny FW 1.1 and up. # -# -# LED Status -# ----------------------- + -------------------------------------------- -# SETUP + Setup -# FAIL + No /tools/impacket/examples/smbserver.py found -# FAIL2 + Target did not acquire IP address -# Yellow single blink + Initialization -# Yellow double blink + HID Stage -# Yellow triple blink + Wait for IP coming up -# Cyan inv single blink + Wait for Handshake (SMBServer Coming up) -# Cyan inv quint blink + Powershell scripts running -# White fast blink + Cleanup, copy Files to /loot -# Green + Finished -# ----------------------- + -------------------------------------------- +# LEDS: +# Magenta: Setup +# Red: No /tools/impacket/examples/smbserver.py found +# Red Blinking: Target did not acquire IP address +# Yellow Blink: Initialization +# Yellow Double Blink: HID Stage +# Yellow Triple Blink: Wait for IP coming up +# Cyan Blink: Wait for Handshake (SMBServer Coming up) +# Cyan Quintuple Blink: Powershell scripts running +# White Rapid Blink: Cleanup, copy Files to /loot +# Green: Finished logger -t DumpCred_2.1 "########################### Start payload DumpCred_2.1 #############################"