mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Update payload.txt
Adding the payload header!
This commit is contained in:
@@ -1,8 +1,25 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
# Title: SMBruteBunny
|
||||
# Author: Mohamed A. Baset (@SymbianSyMoh)
|
||||
# PS: This is the shittiest bash script you'll ever see :D
|
||||
# Title: SMBruteBunny
|
||||
# Author: Mohamed A. Baset (@SymbianSyMoh)
|
||||
# Version: 1.0
|
||||
# Targets: Windows
|
||||
# Attack Modes: HID, RNDIS_ETHERNET
|
||||
# Description: Bruteforces open Windows SMB protocol for valid Credentials against the bruteforce
|
||||
# dictionnary stored in variables "$user_bruteforce_list" and "$pass_bruteforce_list"
|
||||
# then dump the results in text file stored in variable "$password_process_file" then
|
||||
# check for valid or invalid credentials, if valid creds found, store it loot in varaible
|
||||
# "$password_loot_file" then quack it to unlock the machine.
|
||||
#
|
||||
# LEDS:
|
||||
# LED SETUP: Script Setup Stage.
|
||||
# LED STAGE1: Script Stage1 Initialized "Bruteforcing the open SMB for valid Credentials".
|
||||
# LED STAGE2: Script Stage2 Initialized "Checking Bruteforce results".
|
||||
# LED G: SMB Credentials Found.
|
||||
# LED FAIL: SMB Credentials Not Found.
|
||||
# LED CLEANUP: Cleaning up and Syncing filesystem.
|
||||
# LED FINISH: Finished.
|
||||
|
||||
|
||||
# Setup
|
||||
LED SETUP
|
||||
|
||||
Reference in New Issue
Block a user