Files
bashbunny-payloads/payloads/library/credentials/SessionBunny
0iphor13 387a7fea51 Uploaded SessionBunny
Utilize SessionGopher (Slightly modified) to find PuTTY, WinSCP, and Remote Desktop saved sessions. It decrypts saved passwords for WinSCP.
Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords.

Afterwards decide which is important and what you want to save onto your BashBunny.
2022-02-11 19:04:44 +01:00
..
2022-02-11 19:04:44 +01:00
2022-02-11 19:04:44 +01:00
2022-02-11 19:04:44 +01:00
2022-02-11 19:04:44 +01:00

Title: SessionBunny

Author: 0iphor13 Credit for SessionGopher: Brandon Arvanaghi

Version: 1.0

Instruction:

This payload will run the famous SessionGopher script, which was only slightly modified. Searches for PuTTY, WinSCP, and Remote Desktop saved sessions, decrypts saved passwords for WinSCP, Extracts FileZilla, SuperPuTTY's saved session information in the sitemanager.xml file and decodes saved passwords. After you recieve the information, save the items you are interested in simply on your BashBunny.

Instruction:

Place SessionBunny.ps1 in the same payload switch-folder as your payload.txt

Plug in BashBunny. Wait for the script to finish and decide what you wanna do with the information gathered alt text