From 9011db7faebf7d3f77a390f1f175b3863f32d3b0 Mon Sep 17 00:00:00 2001 From: Tudor Gheorghiu <32748771+Prodicode@users.noreply.github.com> Date: Sun, 28 Jan 2018 01:27:46 +0200 Subject: [PATCH] Update unicorn readme.md (#302) --- .../remote_access/Unicorn_PowerShell_Injection/readme.md | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/payloads/library/remote_access/Unicorn_PowerShell_Injection/readme.md b/payloads/library/remote_access/Unicorn_PowerShell_Injection/readme.md index 1f199775..9a4ea326 100644 --- a/payloads/library/remote_access/Unicorn_PowerShell_Injection/readme.md +++ b/payloads/library/remote_access/Unicorn_PowerShell_Injection/readme.md @@ -16,10 +16,8 @@ Configuring this payload is pretty time-consuming, but it's worth it. 1. Download Trustedsec's Unicorn: https://github.com/trustedsec/unicorn and use it to generate a powershell attack script. 2. After you generate a powershell script, execute ```$ msfconsole -r unicorn.rc``` in the same directory in order to start the listener. -3. Transfer **payload.txt** to any of your switches, then open it. -4. Replace ```your_powershell_attack_here``` with the contents of your **powershell_attack.txt** file which was generated. -5. Put a **\\** (backslash) before each special character (**\,** **\"** **\'** **\:** **\;** **\(** **\)** **\[** **\]** **\+**). -6. Save the **payload.txt** file and eject Bash Bunny. You are good to go! Sessions will be opened in the metasploit's listener! +3. You can use [this software(unicorn bash bunny payload generator)](https://github.com/Prodicode/bash-bunny-unicorn-payload-generator) to generate a **payload.txt** from the **powershell_attack.txt**. +4. Transfer the **payload.txt** to one of the switches on the Bash Bunny. You're ready to go! ## Status