Files
bashbunny-payloads/payloads/library/incident_response/Link_File_analysis/payload.txt

20 lines
594 B
Plaintext

# Title: Link File Analysis
# Author: thehappydinoa
# Version: 1.0
# Description: This payload uses a powershell script to search the user profle for lnk files where the target
# is on a drive other than the C: Drive. The output is put into a CSV file in the folder \loot\link-files.
#
# LEDS:
# Magenta - Setup
# Yellow Blinking - Attacking
#
# Target: Windows
LED SETUP
ATTACKMODE HID STORAGE
GET SWITCH_POSITION
LED SETUP
RUN WIN powershell -executionpolicy Bypass ".((gwmi win32_volume -f 'label=''BashBunny''').Name+'payloads\\${SWITCH_POSITION}\run.ps1')"
LED ATTACk