Aidan Holland 5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
..
2017-04-10 13:29:17 +10:00
2017-10-25 11:10:17 +11:00
2017-04-10 13:29:17 +10:00
2017-10-25 11:10:17 +11:00
2017-04-10 13:29:17 +10:00

Exfiltrator for Bash Bunnys

  • Title: USB Exfiltrator
  • Author: Hak5Darren
  • Version: 1.1
  • Target: Windows XP SP3+
  • Props: Diggster, IMcPwn
  • Category: Exfiltration

Description

Exfiltrates files from the users Documents folder Saves to the loot folder on the Bash Bunny USB Mass Storage partition named by the victim hostname, date and timestamp.

Configuration

By default the staged payload exfiltrates PDF files. Change the xcopy commands from e.cmd to your liking.

STATUS

LED Status
ATTACK Attacking :)

Discussion

Hak5 Forum Thread