From d9d741e8281f6af41788b12f483c7df0cb010205 Mon Sep 17 00:00:00 2001 From: "Mohamed A. Baset" Date: Thu, 30 May 2019 00:54:11 -0500 Subject: [PATCH] Update readme.md --- .../library/credentials/SMBruteBunny/readme.md | 14 +++----------- 1 file changed, 3 insertions(+), 11 deletions(-) diff --git a/payloads/library/credentials/SMBruteBunny/readme.md b/payloads/library/credentials/SMBruteBunny/readme.md index bed99e97..937f979d 100644 --- a/payloads/library/credentials/SMBruteBunny/readme.md +++ b/payloads/library/credentials/SMBruteBunny/readme.md @@ -34,17 +34,9 @@ This payload exploits the inherited trust between USB pripherals and computers b Once the password found it will be stored under the "loot" folder and will be entered automatically in the lock screen resulting in unlocking the targeted machine. ## Setup -1. Clone this repo XXX in XXXX -2. Put all the required files in place: -password_process_file -password_loot_file -unlock_hid_script -user_bruteforce_list -pass_bruteforce_list -3. -4. -5. -6. Plug the BashBunny in a locked computer, once the DHCP lease is being offered it will perform SMB bruteforce attack and once succeded it will fire HID script to enter the password and unlock the machine. +1. Copy the payload files to the desired Bash Bunny switch. +2. Switch to the switch which contains the payload +3. Plug the BashBunny in a locked computer, once the DHCP lease is being offered it will perform SMB bruteforce attack and once succeded it will fire HID script to enter the password and unlock the machine. ## Credits [Corey Gilks](https://github.com/Gilks) for [mmcbrute](https://github.com/Gilks/mmcbrute)