mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
psh_DownloadExecSMB
Powershell Download and Execute SMB
- Author: LowValueTarget
- Version: Version 1.2
- Target: Windows XP SP3+ (Powershell)
- Category: Powershell
- Attackmodes: HID, RNDIS_Ethernet
- Firmware: >= 1.2
Description
Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer. SMB Credentials are stored as loot.
Configuration
- Ensure p.txt exists in payload directory. This is the powershell script that will be downloaded and executed.
- Requires Impacket
Installation
See Hak5's Tool Thread Here: https://forums.hak5.org/index.php?/topic/40971-info-tools/
STATUS
| Attack Stage | Description |
|---|---|
| Stage 1 | Powershell |
| Stage 2 | Delivering powershell payload |