mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
30 lines
1.2 KiB
Markdown
30 lines
1.2 KiB
Markdown
# Metasploit-Autopwn
|
|
|
|
* Author: Mohamed A. Baset - @SymbianSyMoh - Seekurity.com
|
|
* Version: Version 0.1
|
|
* Target: All OS / services
|
|
|
|
## Description:
|
|
|
|
Runs Metasploit db_autopwn module against the dhcp connected client to the Bash Bunny device exploiting locked and unlocked machines that running vulnerable OSes or services.
|
|
|
|
## Configuration/Prequisities:
|
|
|
|
1. Ruby 2.4.1 installed via 'rbenv' (the best to have ruby installed without any problems)
|
|
2. You must have metasploit installation up and running in path /toos/metasploit-framework/
|
|
3. Copy auto_pwn.rc metasploit resources file from the payload folder to /tools/ by SSHing into your bunny
|
|
4. One-time fix for adding user "postgres" to the network user groups (should be done by HAK5 folks in the first place)
|
|
|
|
|
|
|
|
## STATUS
|
|
|
|
| LED | Status |
|
|
| ------------------ | -----------------------------------------------|
|
|
| Setup | Setting up stuff |
|
|
| ATTACK | Running Metasploit Autopwn Module |
|
|
| FINISH | Attack Finished (hopefully we got some shells) |
|
|
|
|
## Discussion
|
|
https://forums.hak5.org/topic/41737-metasploit-framework-with-db_autopwn-module-on-bashbunny/
|