mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
* Updated all Payloads for Version 1.2+ Fixed Style Issues on extensions and payloads. Added GET TARGET_OS to get.sh Removed and Fixed all uses ducky_helper.sh (Issue #248) Removed all mention of DUCKY_LANG (Issue #248) Renamed Payloads with spaces in name Added an extension to keep Macs Happy Added a payload for Mac DNS poisoning Fixed Issue #271 changed wget to curl -o Implemented PR #268 Implemented PR #273 * Fixed e.cmd * Fix e.cmd pt2 * Fixed Issues Fixed issues pointed out by @sebkinne Fixed styling errors
Win93 Prank
- Author: gled
- Version: Version 0.1
- Target: Linux or MacOS ( tested on Linux only, with Chromium installed ), Windows planned
Description
- First, uses a Ethernet Attack to run an OS detection via NMAP
- Second, uses a HID Attack to launch a fullscreen browser pointing to www.windows93.net
- leaves a log and the last nmap scan result in $LOOTDIR/win93
Configuration
None needed but:
- you can set the default OS if nmap scan fail to detect ( set DEFAULT_OS to MAC or LINUX )
STATUS
| LED | Status |
|---|---|
| Magenta (solid) | Setting up |
| Yellow (blinking1) | Nmap scan in progress,Ethernet Attack |
| Yellow (blinking2) | Os Detection running, remounted as HID |
| Yellow (blinking3) | HID attack in progress on the detected OS |
| Cyan (blinking) | HID attack in progress on the DEFAULT_OS, detect failed |
| White (blinking) | Cleaning up and syncin |
| Green (solid) | Finished, safe to remove the BB |
| Red (blinking) | Error, check the logs |
Discussion
None yet
TODO
Relaunch the attack in RDNIS_ETHERNET if no ip has been found previously, to start supporting windows too.