RalphyZ 750d384df7 Updated payloads for fw v1.1 (#176)
* Mac Reverse Shell

Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh.  It then runs the script in the background and closes the terminal window.

* Added variables for IP and Port of the Netcat Listener

For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener.  Change those values to your listener and no other edits should be needed.

* Added persistence (and a reason to have a dropper)

This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.

* Mac Reverse Shell

Starts a terminal window on a Mac,then creates a bash reverse shell inside a script, s.sh.  It then runs the script in the background and closes the terminal window.

* Added variables for IP and Port of the Netcat Listener

For ease of use, variables were added at the top for the IP Address and Port of the Netcat Listener.  Change those values to your listener and no other edits should be needed.

* Added persistence (and a reason to have a dropper)

This payload creates a bash reverse shell inside a script and adds persistence by adding the script to the Mac Launch Agent at a user defined interval.

* Fixed additional MacReverseShell

* Added readme.md files

* Added readme.md files

* Added readme.md

* Added readme.md files

* Added readme.md files

* Updated for firmware 1.1

* Updated for firmware 1.1

* Added ThemeChanger and updated for firmware 1.1

* Updated readme.md

* Updated for firmware 1.1 - using RUN command

* Fixed issues with the new RUN - reverted

* Fixed a few script problems

* removed binary and updated readme.md

* added a check for themepack

* edited themechanger readme

* updated readme.md and version
2017-04-29 08:49:35 +10:00
..
2017-04-29 08:49:35 +10:00

RAZ_ReverseShell

  • Author: RalphyZ
  • Version: 1.1
  • Target: Windows 7+
  • Category: Reverse Shell
  • Attackmode: HID, STORAGE

Change Log

Version Changes
1.1 Updated for firmware 1.1
1.0 Initial release

Dependencies

The following files must exist in the switch folder:

nc.exe - Windows binary for netcat with the -e flag

Find nc.exe on Kali, or on NMap's website: http://nmap.org/ncat

listener_port.txt - The Port number for the netcat listener

listener_ip.txt - The IP Address for the netcat listener

Description

Executes a netcat reverse cmd shell at a given IP and Port. This script leaves a trace in the Run Box. The script can auto-increment the listener port so that the PenTester can create several listeners, and target multiple machines while on a walkabout in an office.

Configuration

Set the location of your listener in the listener_ip and listener_port text files.

If you want the listener port to auto-increment, set:

auto_increment=true

Colors

Status Color Description
SETUP Magenta solid Setting attack mode, getting the switch position
FAIL1 Red slow blink Could not find the listener_port.txt file
FAIL2 Red fast blink Could not find the listener_ip.txt file
FAIL3 Red very fast blink Could not find the nc.exe file
SPECIAL Cyan inverted single blink Incrementing the port in listener_port.txt
ATTACK Yellow single blink Running the VBScript
FINISH Green blink followed by SOLID Script is finished