Updated Description

This commit is contained in:
Darkprince 2020-05-16 14:08:56 +05:30 committed by GitHub
parent 7103031e6e
commit 8c13b961a3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -8,9 +8,9 @@ POC DIGISPARK LINK : https://drive.google.com/open?id=1DvKX8QXHImVRZMaoTvmtreFki
Dont forgot to change IP in payload.sh
Before using this payload don't forgot to start netcat listeners on port 4444 and 1337
Because it gives both user shell and root shell
Make sure switch is in 1st position.
When bash bunny executes payload in a machine wich is neither linux nor mac, it will download the payload.sh from server
then executes it and removes the payload.sh.
When bash bunny executes payload in a machine wich is neither linux nor mac, it will executes payload.sh.
Once the payload.sh is executed as explained in the sudobackdoor script it will gets the root credential instead of storing it it will used for getting higher privileges and gives a reverse root netcat connection. Additionaly i have added a user level netcat connection also.