mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
45 lines
2.1 KiB
Markdown
45 lines
2.1 KiB
Markdown
# Reverse Shell Mac for Bash Bunny
|
|
|
|
* Author: 0dyss3us (KeenanV)
|
|
* Version: 1.2
|
|
|
|
## Description
|
|
|
|
Opens a persistent reverse shell on victim's mac and connects it back to host attacker over TCP.
|
|
* Targets MacOS
|
|
* Connection can be closed and reconnected at any time
|
|
* Deploys in roughly 23 sec
|
|
* Works well with NetCat as the listener
|
|
|
|
## Requirements
|
|
|
|
Have a working Bash Bunny :)
|
|
|
|
## STATUS
|
|
|
|
| LED | STATUS |
|
|
| -------------------- | ---------------------------- |
|
|
| Purple | Setup |
|
|
| Amber (Single Blink) | Launching Terminal |
|
|
| Amber (Double Blink) | Creating cron job |
|
|
| White (Fast Blink) | Cleaning up |
|
|
| Green | Finished |
|
|
|
|
## Configuration and Execution
|
|
|
|
1. Plug in Bash Bunny in arming mode
|
|
2. Move files from MacPersistentReverseShell to either switch folder
|
|
3. Edit the payload.txt file and replace `ATTACKER_IP` with attacker's IP and `PORT` with whichever port you like to use (I use 1337 :wink:)
|
|
5. Unplug Bash Bunny and switch it to the position the payload is loaded on
|
|
6. Plug the Bash Bunny into your victim's Mac and wait until the final light turns green (about 30 sec)
|
|
7. Unplug the Bash Bunny and go to attacker's machine
|
|
8. Listen on the port you chose in the payload.txt file on whichever program you'd like (I use NetCat)
|
|
* If using NetCat, run the command `nc -nlvp 1337` (replace the port with the port in connect.sh)
|
|
* If using Windows as the attacker machine, you must install Ncat from: http://nmap.org/dist/ncat-portable-5.59BETA1.zip and use the command `ncat` instead of `nc` from the directory that you installed ncat.exe.
|
|
9. Wait for connection (Should take no longer than 1 minute as the cron job runs every minute)
|
|
10. Once a bash shell prompt appears...YOU'RE DONE!! :smiley: and you can disconnect and reconnect to the victim at any time as long as the user is logged in
|
|
|
|
## Discussion
|
|
|
|
[Click here](https://forums.hak5.org/topic/42728-payload-mac-persistent-reverse-shell/) to access the forum post.
|