mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Add Win_SSLKeyLog Captures the client network session. Captures the client side session keys. 1) Partially avoids "PowerShell Script Block Logging". 2) Closing of all windows. 3) Hide "PowerShell" window. 4) Check if current process have "Administrator" privilege. 5) Sets the "SSLKEYLOGFILE" environment variable to store SSL session key information. 6) Starts a "Network Tracing Session" with "ETW (Event Tracing for Windows)". 7) Writes the file system cache to disk (thanks to @dark_pyrro). 8) Safely eject (thanks to @Night (9o3)). * Correction of some information in "README.md"
"Microsoft Windows" SSLKEYLOG
- Title: Win_SSLKeyLog
- Author: TW-D
- Version: 1.0
- Target: Microsoft Windows
- Category: Credentials
Description
Captures the client network session.
Captures the client side session keys.
- Partially avoids "PowerShell Script Block Logging".
- Closing of all windows.
- Hide "PowerShell" window.
- Check if current process have "Administrator" privilege.
- Sets the "SSLKEYLOGFILE" environment variable to store SSL session key information.
- Starts a "Network Tracing Session" with "ETW (Event Tracing for Windows)".
- Writes the file system cache to disk.
- Safely eject.
Configuration
From "payload.txt" change the values of the following constants :
######## INITIALIZATION ########
readonly BB_LABEL="BashBunny"
readonly SNIFFING_TIME=300
Required
Utility that converts an .etl file containing a Windows network packet capture into .pcapng format. ETL2PCAPNG
Wireshark network protocol analyzer. WIRESHARK
Steps
Convert "capture.etl" file into "capture.pcapng" with "etl2pcapng".
.\etl2pcapng.exe .\capture.etl .\capture.pcapng
Open your "capture.pcapng" with "Wireshark".
Configure "Wireshark" for HTTPS decryption.
Edit - Preferences
Protocols - (SSL and/or TLS)
(Pre)-Master-Secret log filename -> Browse -> SSLKEYLOGFILE.txt
Happy hunting.