mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Update payload.txt
Adding the payload header!
This commit is contained in:
@@ -1,8 +1,25 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
#
|
#
|
||||||
# Title: SMBruteBunny
|
# Title: SMBruteBunny
|
||||||
# Author: Mohamed A. Baset (@SymbianSyMoh)
|
# Author: Mohamed A. Baset (@SymbianSyMoh)
|
||||||
# PS: This is the shittiest bash script you'll ever see :D
|
# Version: 1.0
|
||||||
|
# Targets: Windows
|
||||||
|
# Attack Modes: HID, RNDIS_ETHERNET
|
||||||
|
# Description: Bruteforces open Windows SMB protocol for valid Credentials against the bruteforce
|
||||||
|
# dictionnary stored in variables "$user_bruteforce_list" and "$pass_bruteforce_list"
|
||||||
|
# then dump the results in text file stored in variable "$password_process_file" then
|
||||||
|
# check for valid or invalid credentials, if valid creds found, store it loot in varaible
|
||||||
|
# "$password_loot_file" then quack it to unlock the machine.
|
||||||
|
#
|
||||||
|
# LEDS:
|
||||||
|
# LED SETUP: Script Setup Stage.
|
||||||
|
# LED STAGE1: Script Stage1 Initialized "Bruteforcing the open SMB for valid Credentials".
|
||||||
|
# LED STAGE2: Script Stage2 Initialized "Checking Bruteforce results".
|
||||||
|
# LED G: SMB Credentials Found.
|
||||||
|
# LED FAIL: SMB Credentials Not Found.
|
||||||
|
# LED CLEANUP: Cleaning up and Syncing filesystem.
|
||||||
|
# LED FINISH: Finished.
|
||||||
|
|
||||||
|
|
||||||
# Setup
|
# Setup
|
||||||
LED SETUP
|
LED SETUP
|
||||||
|
|||||||
Reference in New Issue
Block a user