danielgohlke dbae32c86d Update win93 prank payload (#291)
Removed usage fixed browsers and added commands to use the default system browser
2017-11-20 14:21:15 +11:00
..
2017-11-20 14:21:15 +11:00
2017-07-10 07:28:11 +10:00

Win93 Prank

  • Author: gled
  • Version: Version 0.1
  • Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned

Description

  • First, uses a Ethernet Attack to run an OS detection via NMAP
  • Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
  • leaves a log and the last nmap scan result in $LOOTDIR/win93

Configuration

None needed but:

  • you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )

STATUS

LED Status
Magenta (solid) Setting up
Yellow (blinking1) Nmap scan in progress,Ethernet Attack
Yellow (blinking2) Os Detection running, remounted as HID
Yellow (blinking3) HID attack in progress on the detected OS
Cyan (blinking) HID attack in progress on the DEFAULT_OS, detect failed
White (blinking) Cleaning up and syncin
Green (solid) Finished, safe to remove the BB
Red (blinking) Error, check the logs

Discussion

None yet

TODO

Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.