From fcb15af7019fb241de1e249a950ba621fcda20ba Mon Sep 17 00:00:00 2001 From: "Mohamed A. Baset" Date: Thu, 30 May 2019 00:36:31 -0500 Subject: [PATCH] Update readme.md --- payloads/library/credentials/SMBruteBunny/readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/payloads/library/credentials/SMBruteBunny/readme.md b/payloads/library/credentials/SMBruteBunny/readme.md index 3d0bd9f6..bed99e97 100644 --- a/payloads/library/credentials/SMBruteBunny/readme.md +++ b/payloads/library/credentials/SMBruteBunny/readme.md @@ -25,7 +25,7 @@ ------------------------------------------------ SMBruteBunny by: @SymbianSyMoh ``` -* Author: Mohamed A. Baset [@SymbianSyMoh](https://twitter.com/symbiansymoh) +* Author: Mohamed A. Baset aka [@SymbianSyMoh](https://twitter.com/symbiansymoh) ## Description This payload exploits the inherited trust between USB pripherals and computers by setting up an RNDIS interface that works as a DHCP server and offer leases to the connected hosts then it can see the open SMB port which is 445 hence the bruteforcing process starts and once the password is found it will be entered to the lock screen via HID script and unlocking the target machine.