hink ca5d404dbe Added psh_DownloadExecSMB payload (#172)
* Powershell SMB Delivery

* fixed smbserver.py call
2017-04-17 10:19:49 +10:00

26 lines
869 B
Markdown

# psh_DownloadExecSMB
## Powershell Download and Execute SMB
* Author: LowValueTarget
* Version: Version 1.0
* Target: Windows XP SP3+ (Powershell)
* Category: Powershell
* Attackmodes: HID, RNDIS_Ethernet
* Firmware: >= 1.1
## Description
Quick HID attack to retrieve and run powershell payload from BashBunny SMBServer. Credentials are stored as loot.
## Configuration
* Ensure psh.txt exists in payload directory. This is the powershell script that will be downloaded and executed.
* Requires Impacket is installed (python ./impacket/setup.py install)
## STATUS
| Attack Stage | Description |
| ------------------- | ------------------------------|
| Stage 1 | HID |
| Stage 2 | RNDIS_ETHERNET |
| Stage 3 | Delivering powershell payload |