Files
bashbunny-payloads/payloads/library/prank/win93/README.md
Tristan Mahé 80d622e16e Added Win93 prank payload (#231)
* win93 payload initial release

* readme.md: added TODO

* payload.txt: corrected the command, no need to escape everything

* initial windows support
2017-07-10 07:28:11 +10:00

36 lines
1.5 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
# Win93 Prank
* Author: gled
* Version: Version 0.1
* Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned
## Description
- First, uses a Ethernet Attack to run an OS detection via NMAP
- Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
- leaves a log and the last nmap scan result in $LOOTDIR/win93
## Configuration
None needed but:
- you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )
## STATUS
| LED | Status |
| ------------------ | ------------------------------------------------------- |
| Magenta (solid) | Setting up |
| Yellow (blinking1) | Nmap scan in progress,Ethernet Attack |
| Yellow (blinking2) | Os Detection running, remounted as HID |
| Yellow (blinking3) | HID attack in progress on the detected OS |
| Cyan (blinking) | HID attack in progress on the DEFAULT_OS, detect failed |
| White (blinking) | Cleaning up and syncin |
| Green (solid) | Finished, safe to remove the BB |
| Red (blinking) | Error, check the logs |
## Discussion
None yet
## TODO
Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.