mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Win93 Prank
- Author: gled
- Version: Version 0.1
- Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned
Description
- First, uses a Ethernet Attack to run an OS detection via NMAP
- Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
- leaves a log and the last nmap scan result in $LOOTDIR/win93
Configuration
None needed but:
- you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )
STATUS
| LED | Status |
|---|---|
| Magenta (solid) | Setting up |
| Yellow (blinking1) | Nmap scan in progress,Ethernet Attack |
| Yellow (blinking2) | Os Detection running, remounted as HID |
| Yellow (blinking3) | HID attack in progress on the detected OS |
| Cyan (blinking) | HID attack in progress on the DEFAULT_OS, detect failed |
| White (blinking) | Cleaning up and syncin |
| Green (solid) | Finished, safe to remove the BB |
| Red (blinking) | Error, check the logs |
Discussion
None yet
TODO
Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.