mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
New options for optical exfil payload (#317)
This commit is contained in:
parent
81e6d536dd
commit
920ff7fa67
File diff suppressed because one or more lines are too long
@ -12,11 +12,20 @@
|
||||
# and open a browser, to exfiltrate data Using QR Codes and a video
|
||||
# recording device.
|
||||
#
|
||||
# Optional html params:
|
||||
# base64: Passing a base64 string to this param will auto-start processing QR Codes.
|
||||
#
|
||||
# playback: Passing the string "finish" to this param will auto-play the results,
|
||||
# when QR codes finish rendering.
|
||||
#
|
||||
# Example:
|
||||
# Ln65: Q STRING firefox "$target_html?playback=finish&base64=my_long_string"
|
||||
#
|
||||
# | Attack Stage | Description |
|
||||
# | ------------------- | ---------------------------------------- |
|
||||
# | SETUP | Open vi |
|
||||
# | ATTACK | Writing HTML |
|
||||
# | FINISH | Browser Ready |
|
||||
# | FINISH | Browser Ready/Processing |
|
||||
#
|
||||
|
||||
ATTACKMODE HID
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user