mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
30 lines
871 B
Markdown
30 lines
871 B
Markdown
# psh_DownloadExecSMB
|
|
## Powershell Download and Execute SMB
|
|
|
|
* Author: LowValueTarget
|
|
* Version: Version 1.2
|
|
* Target: Windows XP SP3+ (Powershell)
|
|
* Category: Powershell
|
|
* Attackmodes: HID, RNDIS_Ethernet
|
|
* Firmware: >= 1.2
|
|
|
|
## Description
|
|
|
|
Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer. SMB Credentials are stored as loot.
|
|
|
|
## Configuration
|
|
|
|
* Ensure p.txt exists in payload directory. This is the powershell script that will be downloaded and executed.
|
|
* Requires Impacket
|
|
|
|
__Installation__
|
|
|
|
See Hak5's Tool Thread Here: https://forums.hak5.org/index.php?/topic/40971-info-tools/
|
|
|
|
## STATUS
|
|
|
|
| Attack Stage | Description |
|
|
| ------------------- | ------------------------------|
|
|
| Stage 1 | Powershell |
|
|
| Stage 2 | Delivering powershell payload |
|