Files
bashbunny-payloads/payloads/library/prank/win93
Aidan Holland 5a77792c1d Update and fix payloads (#277)
* Updated all Payloads for Version 1.2+

Fixed Style Issues on extensions and payloads.
Added GET TARGET_OS to get.sh
Removed and Fixed all uses ducky_helper.sh (Issue #248)
Removed all mention of DUCKY_LANG (Issue #248)
Renamed Payloads with spaces in name
Added an extension to keep Macs Happy
Added a payload for Mac DNS poisoning
Fixed Issue #271 changed wget to curl -o
Implemented PR #268
Implemented PR #273

* Fixed e.cmd

* Fix e.cmd pt2

* Fixed Issues

Fixed issues pointed out by @sebkinne
Fixed styling errors
2017-10-25 11:10:17 +11:00
..
2017-10-25 11:10:17 +11:00
2017-07-10 07:28:11 +10:00

Win93 Prank

  • Author: gled
  • Version: Version 0.1
  • Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned

Description

  • First, uses a Ethernet Attack to run an OS detection via NMAP
  • Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
  • leaves a log and the last nmap scan result in $LOOTDIR/win93

Configuration

None needed but:

  • you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )

STATUS

LED Status
Magenta (solid) Setting up
Yellow (blinking1) Nmap scan in progress,Ethernet Attack
Yellow (blinking2) Os Detection running, remounted as HID
Yellow (blinking3) HID attack in progress on the detected OS
Cyan (blinking) HID attack in progress on the DEFAULT_OS, detect failed
White (blinking) Cleaning up and syncin
Green (solid) Finished, safe to remove the BB
Red (blinking) Error, check the logs

Discussion

None yet

TODO

Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.