Updated Description

This commit is contained in:
Darkprince
2020-05-16 14:08:56 +05:30
committed by GitHub
parent 7103031e6e
commit 8c13b961a3

View File

@@ -8,9 +8,9 @@ POC DIGISPARK LINK : https://drive.google.com/open?id=1DvKX8QXHImVRZMaoTvmtreFki
Dont forgot to change IP in payload.sh
Before using this payload don't forgot to start netcat listeners on port 4444 and 1337
Because it gives both user shell and root shell
Make sure switch is in 1st position.
When bash bunny executes payload in a machine wich is neither linux nor mac, it will download the payload.sh from server
then executes it and removes the payload.sh.
When bash bunny executes payload in a machine wich is neither linux nor mac, it will executes payload.sh.
Once the payload.sh is executed as explained in the sudobackdoor script it will gets the root credential instead of storing it it will used for getting higher privileges and gives a reverse root netcat connection. Additionaly i have added a user level netcat connection also.