From 920ff7fa678c75fb89c60c37ee574b70fc7bfde7 Mon Sep 17 00:00:00 2001 From: bg-wa Date: Sat, 27 Jan 2018 15:24:58 -0800 Subject: [PATCH] New options for optical exfil payload (#317) --- .../exfiltration/optical-exfiltration/index.min.html | 6 +++--- .../exfiltration/optical-exfiltration/payload.txt | 11 ++++++++++- 2 files changed, 13 insertions(+), 4 deletions(-) diff --git a/payloads/library/exfiltration/optical-exfiltration/index.min.html b/payloads/library/exfiltration/optical-exfiltration/index.min.html index 811af6c7..0dcd69d6 100644 --- a/payloads/library/exfiltration/optical-exfiltration/index.min.html +++ b/payloads/library/exfiltration/optical-exfiltration/index.min.html @@ -4,17 +4,17 @@ QR Extract - +

diff --git a/payloads/library/exfiltration/optical-exfiltration/payload.txt b/payloads/library/exfiltration/optical-exfiltration/payload.txt index a7463e39..6f70b5df 100755 --- a/payloads/library/exfiltration/optical-exfiltration/payload.txt +++ b/payloads/library/exfiltration/optical-exfiltration/payload.txt @@ -12,11 +12,20 @@ # and open a browser, to exfiltrate data Using QR Codes and a video # recording device. # +# Optional html params: +# base64: Passing a base64 string to this param will auto-start processing QR Codes. +# +# playback: Passing the string "finish" to this param will auto-play the results, +# when QR codes finish rendering. +# +# Example: +# Ln65: Q STRING firefox "$target_html?playback=finish&base64=my_long_string" +# # | Attack Stage | Description | # | ------------------- | ---------------------------------------- | # | SETUP | Open vi | # | ATTACK | Writing HTML | -# | FINISH | Browser Ready | +# | FINISH | Browser Ready/Processing | # ATTACKMODE HID